Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain, (Wed, Jan 14th)
Lumma Stealer infections have been observed repeatedly adding multiple scheduled tasks on infected Windows hosts, all executing the same mshta command to communicate with a C2 domain (fileless-market. cc). This behavior causes increased and persistent HTTPS traffic to the same C2 server, with infections retrieving follow-up commands from a Pastebin URL. The scheduled tasks self-propagate, resulting in dozens of tasks running concurrently over time, which is an unusual and novel persistence and C2 communication technique. No known exploits are reported in the wild beyond observed infections. The infection leverages PowerShell and mshta for fileless execution, complicating detection. This threat poses risks of ongoing data exfiltration and persistent remote control. European organizations using Windows systems are at risk, especially those with less mature endpoint detection capabilities. Mitigation requires focused detection of unusual scheduled task creation patterns, blocking related domains, and restricting mshta and PowerShell usage. Countries with high Windows usage and strategic sectors targeted by data stealers are most likely affected.
AI Analysis
Technical Summary
The Lumma Stealer malware has been observed engaging in a distinctive post-infection behavior pattern involving the repeated creation of scheduled tasks on infected Windows hosts. After initial data exfiltration, the infected system retrieves a PowerShell command from a Pastebin raw URL, which downloads and executes a script from a .cc domain (fileless-market.cc) using mshta.exe. This script execution triggers the creation of multiple scheduled tasks, each configured to run the same mshta command targeting the C2 server. Over time, the number of scheduled tasks increases significantly (e.g., 31 tasks after 11 hours), all performing identical actions, thereby generating persistent and increasing HTTPS traffic to the same C2 domain. This behavior is unusual and has not been previously documented by SANS ISC handlers. The infection chain involves fileless techniques leveraging PowerShell and mshta, which complicates detection and removal. The scheduled tasks provide persistence and ensure continuous communication with the attacker-controlled C2 infrastructure. The infection's reliance on Pastebin for initial command retrieval and the use of .cc domains for C2 traffic indicate a multi-stage infection process. Although no known exploits have been reported, the infection's persistence and data exfiltration capabilities pose a medium severity threat. The infection primarily affects Windows hosts and exploits native Windows tools for stealth and persistence.
Potential Impact
For European organizations, this threat can lead to prolonged unauthorized access and data exfiltration due to the persistent scheduled tasks that maintain continuous C2 communication. The repeated creation of scheduled tasks can degrade system performance and increase network traffic, potentially triggering network congestion or detection alerts. The use of legitimate Windows utilities (mshta and PowerShell) for malicious purposes complicates detection and remediation efforts, increasing the risk of prolonged compromise. Sensitive data could be continuously siphoned off, impacting confidentiality. The persistence mechanism also increases the difficulty of fully eradicating the infection, raising the risk of lateral movement within networks. Organizations in critical infrastructure, finance, healthcare, and government sectors could face significant operational and reputational damage if infected. The infection's stealthy nature may delay incident response, allowing attackers to maintain footholds and expand their access.
Mitigation Recommendations
1. Implement monitoring and alerting for unusual scheduled task creation patterns, especially multiple tasks with identical triggers and actions involving mshta.exe or PowerShell commands. 2. Restrict or block outbound traffic to suspicious domains such as fileless-market.cc and Pastebin raw URLs used for command retrieval at network perimeter firewalls and DNS filtering solutions. 3. Apply application control policies to restrict or block mshta.exe and PowerShell usage to only approved scripts and commands, leveraging Windows Defender Application Control or similar tools. 4. Conduct thorough endpoint detection and response (EDR) investigations to identify and remove all scheduled tasks related to this infection and any associated persistence mechanisms. 5. Educate security teams to recognize fileless infection patterns and unusual scheduled task behaviors. 6. Regularly update and patch Windows systems to reduce the attack surface, although this infection leverages legitimate tools rather than software vulnerabilities. 7. Employ network traffic analysis to detect abnormal HTTPS session volumes to uncommon domains. 8. Use threat intelligence feeds to update blocklists and detection signatures related to Lumma Stealer and associated infrastructure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain, (Wed, Jan 14th)
Description
Lumma Stealer infections have been observed repeatedly adding multiple scheduled tasks on infected Windows hosts, all executing the same mshta command to communicate with a C2 domain (fileless-market. cc). This behavior causes increased and persistent HTTPS traffic to the same C2 server, with infections retrieving follow-up commands from a Pastebin URL. The scheduled tasks self-propagate, resulting in dozens of tasks running concurrently over time, which is an unusual and novel persistence and C2 communication technique. No known exploits are reported in the wild beyond observed infections. The infection leverages PowerShell and mshta for fileless execution, complicating detection. This threat poses risks of ongoing data exfiltration and persistent remote control. European organizations using Windows systems are at risk, especially those with less mature endpoint detection capabilities. Mitigation requires focused detection of unusual scheduled task creation patterns, blocking related domains, and restricting mshta and PowerShell usage. Countries with high Windows usage and strategic sectors targeted by data stealers are most likely affected.
AI-Powered Analysis
Technical Analysis
The Lumma Stealer malware has been observed engaging in a distinctive post-infection behavior pattern involving the repeated creation of scheduled tasks on infected Windows hosts. After initial data exfiltration, the infected system retrieves a PowerShell command from a Pastebin raw URL, which downloads and executes a script from a .cc domain (fileless-market.cc) using mshta.exe. This script execution triggers the creation of multiple scheduled tasks, each configured to run the same mshta command targeting the C2 server. Over time, the number of scheduled tasks increases significantly (e.g., 31 tasks after 11 hours), all performing identical actions, thereby generating persistent and increasing HTTPS traffic to the same C2 domain. This behavior is unusual and has not been previously documented by SANS ISC handlers. The infection chain involves fileless techniques leveraging PowerShell and mshta, which complicates detection and removal. The scheduled tasks provide persistence and ensure continuous communication with the attacker-controlled C2 infrastructure. The infection's reliance on Pastebin for initial command retrieval and the use of .cc domains for C2 traffic indicate a multi-stage infection process. Although no known exploits have been reported, the infection's persistence and data exfiltration capabilities pose a medium severity threat. The infection primarily affects Windows hosts and exploits native Windows tools for stealth and persistence.
Potential Impact
For European organizations, this threat can lead to prolonged unauthorized access and data exfiltration due to the persistent scheduled tasks that maintain continuous C2 communication. The repeated creation of scheduled tasks can degrade system performance and increase network traffic, potentially triggering network congestion or detection alerts. The use of legitimate Windows utilities (mshta and PowerShell) for malicious purposes complicates detection and remediation efforts, increasing the risk of prolonged compromise. Sensitive data could be continuously siphoned off, impacting confidentiality. The persistence mechanism also increases the difficulty of fully eradicating the infection, raising the risk of lateral movement within networks. Organizations in critical infrastructure, finance, healthcare, and government sectors could face significant operational and reputational damage if infected. The infection's stealthy nature may delay incident response, allowing attackers to maintain footholds and expand their access.
Mitigation Recommendations
1. Implement monitoring and alerting for unusual scheduled task creation patterns, especially multiple tasks with identical triggers and actions involving mshta.exe or PowerShell commands. 2. Restrict or block outbound traffic to suspicious domains such as fileless-market.cc and Pastebin raw URLs used for command retrieval at network perimeter firewalls and DNS filtering solutions. 3. Apply application control policies to restrict or block mshta.exe and PowerShell usage to only approved scripts and commands, leveraging Windows Defender Application Control or similar tools. 4. Conduct thorough endpoint detection and response (EDR) investigations to identify and remove all scheduled tasks related to this infection and any associated persistence mechanisms. 5. Educate security teams to recognize fileless infection patterns and unusual scheduled task behaviors. 6. Regularly update and patch Windows systems to reduce the attack surface, although this infection leverages legitimate tools rather than software vulnerabilities. 7. Employ network traffic analysis to detect abnormal HTTPS session volumes to uncommon domains. 8. Use threat intelligence feeds to update blocklists and detection signatures related to Lumma Stealer and associated infrastructure.
Affected Countries
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32628","fetched":true,"fetchedAt":"2026-01-14T19:50:05.742Z","wordCount":505}
Threat ID: 6967f375f809b25a98068854
Added to database: 1/14/2026, 7:50:13 PM
Last enriched: 1/14/2026, 7:50:30 PM
Last updated: 1/14/2026, 9:31:32 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0962: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
MediumCVE-2026-0961: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
MediumCVE-2026-0960: CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') in Wireshark Foundation Wireshark
MediumCVE-2026-0959: CWE-787: Out-of-bounds Write in Wireshark Foundation Wireshark
MediumCVE-2026-22779: CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') in Neoteroi BlackSheep
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.