Managed XDR
Group-IB MDP Report
File info
Filename: c-users-user-appdata-local-temp-vhpyq03m.5bx-v1.1.0-readme.docx.lnk
File Type: MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=0, Archive, ctime=Thu Aug 29 14:52:48 2024, mtime=Fri Dec 20 18:05:41 2024, atime=Thu Aug 29 14:52:48 2024, length=455680, window=hide
File Size: 2.3 KB
Env info
win7/x86 en
Hashes
SHA1: df5977d0a9b4b6ed5d0b758f77a26b46a6a485ec
SHA256: 802f56cc84689a68112a2cf76ddce70e1e3956038e19bb8c58f74d5713d72a5f
MD5: 5b1396364c0c0d20ab3dc4767dcb8e91
Malwares
LummaC2
Signatures
Execution
T1059 autoit: AutoIt script execution detected
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1059.001 suspicious_process: Spawns a suspicious process
T1106 susp_callbacks: Suspicious usage of some WinAPI with callbacks
T1047 has_wmi: Executes one or several WMI requests
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1140 unpacking_utilities: Uses Windows utilities to unpack data
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1552 cookie_files: Accesses cookie files
T1555.003 cookie_files: Accesses cookie files
T1056.001 infostealer_keylogger: Keylogger (intercepts keystrokes)
Discovery
T1057 process_interest: Enumerates processes
T1082 uses_windows_utilities: Uses Windows utilities for basic Windows functionality
T1518 locates_browser: Attempts to identify where browsers are installed
T1082 reads_csrss: Attempts to read csrss.exe memory
Collection
T1056.001 infostealer_keylogger: Keylogger (intercepts keystrokes)
Command and Control
T1568.002 dga_domains: Connects to DGA domains
T1071.001 network_http: Performs HTTP requests
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other
yara_rules: Static rules
drops_interpreter: Creates intrepreter binary file
kills_explorer: Terminates explorer.exe process
creates_in_windows: Creates files in the Windows directory
creates_exe: Creates executable files in the file system
dns_without_resolve: DNS query without a response
executes_dropped_exe: Executes dropped exe files
unexpected_exception: Unexpected exception
creates_suspended_process: Creates suspended process
access_recyclebin: Manipulation with recyclebin detected
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
Managed XDR