Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
08/03/2025, 16:52
Behavioral task
behavioral1
Sample
6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe
Resource
win10v2004-20250217-en
General
-
Target
6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe
-
Size
6.0MB
-
MD5
febc63e02763cd676b1446b024639b81
-
SHA1
23c29ea38ed641f9926193befb1ac1a8c3e7d4e6
-
SHA256
6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7
-
SHA512
93a5e23859db3a29e2a34f6709566a79a1cd2b0f0ad7d6bf4efe34dbdd784e520bc06776e1ea00a13ceba95ac1ee2ea38d0eec4abbed4e15d2a334dc36d8a881
-
SSDEEP
49152:6Y3oQWF4WcPgM4+K2RjJjtE4HAZrGadSZMRPaThP46IPyIcju8HwQKpOlC6Z+Xe:6+5Nri4Uaad5Ml0ojeUEbkJA+Kxh
Malware Config
Signatures
-
Luca Stealer
Info stealer written in Rust first seen in July 2022.
-
Lucastealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1652 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 32 PID 2068 wrote to memory of 1652 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 32 PID 2068 wrote to memory of 1652 2068 6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe 32 PID 1652 wrote to memory of 2924 1652 cmd.exe 34 PID 1652 wrote to memory of 2924 1652 cmd.exe 34 PID 1652 wrote to memory of 2924 1652 cmd.exe 34 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe"C:\Users\Admin\AppData\Local\Temp\6950eb2bd04f9a5d84adb5ac4f5d78b8a76d2beef553e5d1d54b4388f15061e7.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\cmd.exe"cmd.exe" /c "schtasks /Create /TR C:\Users\Admin\AppData\Roaming\svchost.exe /SC ONLOGON /TN RecordArchive /IT"2⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\schtasks.exeschtasks /Create /TR C:\Users\Admin\AppData\Roaming\svchost.exe /SC ONLOGON /TN RecordArchive /IT3⤵
- Scheduled Task/Job: Scheduled Task
PID:2924
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
87KB
MD5612a765e7a674a44441dc6942712386f
SHA150d00d8c206e1cc1dcc3fb6e0b06f20ee91ccb1d
SHA256127d023ac38604aaf8aecd405e7484218dccac2266e0792916af308063c9d3d8
SHA5121f0a16d4f5e944dbbf4066907e286f95859150b7288c51a5cf50bc1c78ec7edb533166f8efb600bb3dbbd0801444a14fc11c538bb8807b7b6315306904d98cf5