Resubmissions

28/03/2025, 18:26

250328-w3prbsztes 10

28/03/2025, 17:35

250328-v6e6mayzet 10

Analysis

  • max time kernel
    284s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 18:26

General

  • Target

    37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe

  • Size

    1.8MB

  • MD5

    8480b3439f6f2fe71ff8136c8475a0e1

  • SHA1

    8f787c424f7a1ac854d26b723008ea29d9f1b1aa

  • SHA256

    37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8

  • SHA512

    2b72c1f30549156dcf42aff32d2967580147a1cc499ca93f7a3e2b773e814bd9c368772d6ed02031c086b2c8376b405d30c7a43abff0729732232ad008e97958

  • SSDEEP

    49152:fyPxPnQHIr7nIXvPvwrARGSLEUBLEffrLrr90+:6PxfQoTIXvPYlSLEWgXrLrr

Malware Config

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://esccapewz.run/ANSbwqy

https://travewlio.shop/ZNxbHi

https://touvrlane.bet/ASKwjq

https://sighbtseeing.shop/ASJnzh

https://advennture.top/GKsiio

https://targett.top/dsANGt

https://holidamyup.today/AOzkns

https://mtriplooqp.world/APowko

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Downloads MZ/PE file 3 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 3 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe
    "C:\Users\Admin\AppData\Local\Temp\37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
      "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Downloads MZ/PE file
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Local\Temp\10361660101\UYpk7xI.exe
        "C:\Users\Admin\AppData\Local\Temp\10361660101\UYpk7xI.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 940 -s 44
          4⤵
          • Loads dropped DLL
          PID:2980
      • C:\Users\Admin\AppData\Local\Temp\10361680101\jokererer.exe
        "C:\Users\Admin\AppData\Local\Temp\10361680101\jokererer.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2004 -s 28
          4⤵
          • Loads dropped DLL
          PID:916
      • C:\Users\Admin\AppData\Local\Temp\10361700101\74957b3341.exe
        "C:\Users\Admin\AppData\Local\Temp\10361700101\74957b3341.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:580
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\Local\Temp\10361660101\UYpk7xI.exe

    Filesize

    634KB

    MD5

    4e84cb2a5369e3407e1256773ae4ad15

    SHA1

    ab1a10e3d2c6b4e7623fe9740cfc84e3b2ae6ef5

    SHA256

    110a54e185a48812d3ae0b45a0947945dc33de2476f89f571b9e1ef6801c0590

    SHA512

    96e67ab56f75669c595c543f2f1c7e11ba62028271b7fa07104fdd0e70cdb502f20047991141cfc248e8f6ad9cfd1eff11e09b3ea6dcc4c8f62004bd17dd0988

  • C:\Users\Admin\AppData\Local\Temp\10361680101\jokererer.exe

    Filesize

    712KB

    MD5

    e714f21784ba313bf9b0ceb2c138895a

    SHA1

    cabe70a2b37e02706d9118702e1692735a6c7b9a

    SHA256

    8730a3f5b2e25609cf42ee706bd062ab31c7499f51780f015815b2f9ad1dce44

    SHA512

    c99a439bad99363a10df4e0669e4670d80fdab3947df535c4f3b421f09922dbef8b4f7b7a7f8c9dc167dd2f3ff0fc7ce55621335978679f89bf3a702553b932b

  • C:\Users\Admin\AppData\Local\Temp\10361700101\74957b3341.exe

    Filesize

    1.8MB

    MD5

    b8239424c867eb7092984f129e4d9532

    SHA1

    e944db66ad5d4631b749ed78ed6020327fb9e551

    SHA256

    7d4d7e11cc02766414332b4817c853ddc34624290e2e4b4a0bfea5e749c146f6

    SHA512

    693cf806fb781fe53fdcd6b36d36a98841557cf440d5f2de52420cfea632cbc4d24cf0761d1a08107eb53c8c05743766db794ed1d93305540e583c90f2bd5e00

  • C:\Users\Admin\AppData\Local\Temp\Tar5317.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • \Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

    Filesize

    1.8MB

    MD5

    8480b3439f6f2fe71ff8136c8475a0e1

    SHA1

    8f787c424f7a1ac854d26b723008ea29d9f1b1aa

    SHA256

    37700bf5466bc1a05e759b3cc56f984e8b4e0102e0fc24291bc56587c71310b8

    SHA512

    2b72c1f30549156dcf42aff32d2967580147a1cc499ca93f7a3e2b773e814bd9c368772d6ed02031c086b2c8376b405d30c7a43abff0729732232ad008e97958

  • memory/580-159-0x0000000000170000-0x0000000000613000-memory.dmp

    Filesize

    4.6MB

  • memory/580-161-0x0000000000170000-0x0000000000613000-memory.dmp

    Filesize

    4.6MB

  • memory/580-156-0x0000000000170000-0x0000000000613000-memory.dmp

    Filesize

    4.6MB

  • memory/2052-5-0x00000000003E0000-0x00000000008A6000-memory.dmp

    Filesize

    4.8MB

  • memory/2052-0-0x00000000003E0000-0x00000000008A6000-memory.dmp

    Filesize

    4.8MB

  • memory/2052-16-0x00000000069C0000-0x0000000006E86000-memory.dmp

    Filesize

    4.8MB

  • memory/2052-15-0x00000000003E0000-0x00000000008A6000-memory.dmp

    Filesize

    4.8MB

  • memory/2052-1-0x0000000077C80000-0x0000000077C82000-memory.dmp

    Filesize

    8KB

  • memory/2052-2-0x00000000003E1000-0x000000000040F000-memory.dmp

    Filesize

    184KB

  • memory/2052-3-0x00000000003E0000-0x00000000008A6000-memory.dmp

    Filesize

    4.8MB

  • memory/2248-110-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2248-133-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2248-134-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2248-137-0x00000000039D0000-0x00000000039E0000-memory.dmp

    Filesize

    64KB

  • memory/2248-111-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2852-18-0x0000000001051000-0x000000000107F000-memory.dmp

    Filesize

    184KB

  • memory/2852-89-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-26-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-132-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-25-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-24-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-135-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-136-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-23-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-138-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-22-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-153-0x0000000006110000-0x00000000065B3000-memory.dmp

    Filesize

    4.6MB

  • memory/2852-155-0x0000000006110000-0x00000000065B3000-memory.dmp

    Filesize

    4.6MB

  • memory/2852-21-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-158-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-19-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB

  • memory/2852-17-0x0000000001050000-0x0000000001516000-memory.dmp

    Filesize

    4.8MB