Resubmissions

28-07-2023 16:30

230728-tz3snseh4y 10

28-07-2023 16:28

230728-ty4ctaec58 10

Analysis

  • max time kernel
    39s
  • max time network
    43s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-07-2023 16:28

General

  • Target

    Ice.exe

  • Size

    228KB

  • MD5

    5f25397473870629f943edcc0b137281

  • SHA1

    368474f6392f0547bc02b138fe199a7b005d0122

  • SHA256

    03dbbb05e1588d2303720a4edfb8cb0c6dfef922b85ed66d43b67cde6bc68c3e

  • SHA512

    de326d719bb44fade2693afbdf79b8f89a38f4405eadf087bf75a049af27195cda9b8b2b1bae0c254d7202f3f2539217201389135b5255584e16ecb8eb6af1e7

  • SSDEEP

    6144:RloZM+rIkd8g+EtXHkv/iD4v2AsbhS6FiAxDeebdyb8e1m/i:joZtL+EP8v2AsbhS6FiAxDeeb4h

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ice.exe
    "C:\Users\Admin\AppData\Local\Temp\Ice.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3960
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5084

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3960-133-0x000001AB0B5E0000-0x000001AB0B620000-memory.dmp

    Filesize

    256KB

  • memory/3960-134-0x00007FFF8AEB0000-0x00007FFF8B971000-memory.dmp

    Filesize

    10.8MB

  • memory/3960-135-0x000001AB25D50000-0x000001AB25D60000-memory.dmp

    Filesize

    64KB

  • memory/3960-137-0x00007FFF8AEB0000-0x00007FFF8B971000-memory.dmp

    Filesize

    10.8MB