Analysis
-
max time kernel
23s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
Cheat_by_DioZ.exe
Resource
win10-20230703-en
General
-
Target
Cheat_by_DioZ.exe
-
Size
15.3MB
-
MD5
7e8d421582aacc3651a5f8ae391e4605
-
SHA1
0cff4ece5e75a5dc0c5e6076ad782ecf42ad7c16
-
SHA256
a85235b38f90be244eb57d131951ff69a562714221d640ab9da0480af4aed06c
-
SHA512
7eb24ed0bddb9a681c231c92c50b52015b09466262dbdf1c1e47219f4fe76cff9adf65860d2c03cf61e8d4e7aa7ee46a7a81464773c56a81fee4a2ebec8192f1
-
SSDEEP
196608:0KMurhe046YIw782LRg5lA7B+juGhgdKDW/vDhoOocQ4cfVqwc7Mzg:0hurhf4Qm8MR8gwRh+n/lvoPDc70
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1143115606330200074/pyKgc8H0hMiolN7TnRv_a5UZxMEV9hMyMPcyMEE79xLCjkKRbFA2ce8qYJuxmfb_M-83
Signatures
-
Detect Umbral payload 5 IoCs
resource yara_rule behavioral2/memory/1984-133-0x0000000000400000-0x000000000135C000-memory.dmp family_umbral behavioral2/files/0x00080000000231ff-138.dat family_umbral behavioral2/files/0x00080000000231ff-191.dat family_umbral behavioral2/files/0x00080000000231ff-192.dat family_umbral behavioral2/memory/1084-195-0x00000215A7830000-0x00000215A7870000-memory.dmp family_umbral -
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 1844 created 408 1844 MS.exe 36 PID 1844 created 408 1844 MS.exe 36 PID 1844 created 408 1844 MS.exe 36 PID 1844 created 408 1844 MS.exe 36 PID 1844 created 408 1844 MS.exe 36 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts MS.exe -
Stops running service(s) 3 TTPs
-
Executes dropped EXE 2 IoCs
pid Process 1084 3S.exe 1844 MS.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1844 set thread context of 968 1844 MS.exe 103 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 432 sc.exe 1628 sc.exe 1324 sc.exe 4976 sc.exe 2896 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3520 1020 WerFault.exe 8 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Cheat_by_DioZ.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1844 MS.exe 1844 MS.exe 428 powershell.exe 428 powershell.exe 1844 MS.exe 1844 MS.exe 1844 MS.exe 1844 MS.exe 1844 MS.exe 1844 MS.exe 1844 MS.exe 1844 MS.exe 968 dialer.exe 968 dialer.exe 968 dialer.exe 5020 powershell.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1084 3S.exe Token: SeIncreaseQuotaPrivilege 4980 wmic.exe Token: SeSecurityPrivilege 4980 wmic.exe Token: SeTakeOwnershipPrivilege 4980 wmic.exe Token: SeLoadDriverPrivilege 4980 wmic.exe Token: SeSystemProfilePrivilege 4980 wmic.exe Token: SeSystemtimePrivilege 4980 wmic.exe Token: SeProfSingleProcessPrivilege 4980 wmic.exe Token: SeIncBasePriorityPrivilege 4980 wmic.exe Token: SeCreatePagefilePrivilege 4980 wmic.exe Token: SeBackupPrivilege 4980 wmic.exe Token: SeRestorePrivilege 4980 wmic.exe Token: SeShutdownPrivilege 4980 wmic.exe Token: SeDebugPrivilege 4980 wmic.exe Token: SeSystemEnvironmentPrivilege 4980 wmic.exe Token: SeRemoteShutdownPrivilege 4980 wmic.exe Token: SeUndockPrivilege 4980 wmic.exe Token: SeManageVolumePrivilege 4980 wmic.exe Token: 33 4980 wmic.exe Token: 34 4980 wmic.exe Token: 35 4980 wmic.exe Token: 36 4980 wmic.exe Token: SeIncreaseQuotaPrivilege 4980 wmic.exe Token: SeSecurityPrivilege 4980 wmic.exe Token: SeTakeOwnershipPrivilege 4980 wmic.exe Token: SeLoadDriverPrivilege 4980 wmic.exe Token: SeSystemProfilePrivilege 4980 wmic.exe Token: SeSystemtimePrivilege 4980 wmic.exe Token: SeProfSingleProcessPrivilege 4980 wmic.exe Token: SeIncBasePriorityPrivilege 4980 wmic.exe Token: SeCreatePagefilePrivilege 4980 wmic.exe Token: SeBackupPrivilege 4980 wmic.exe Token: SeRestorePrivilege 4980 wmic.exe Token: SeShutdownPrivilege 4980 wmic.exe Token: SeDebugPrivilege 4980 wmic.exe Token: SeSystemEnvironmentPrivilege 4980 wmic.exe Token: SeRemoteShutdownPrivilege 4980 wmic.exe Token: SeUndockPrivilege 4980 wmic.exe Token: SeManageVolumePrivilege 4980 wmic.exe Token: 33 4980 wmic.exe Token: 34 4980 wmic.exe Token: 35 4980 wmic.exe Token: 36 4980 wmic.exe Token: SeDebugPrivilege 428 powershell.exe Token: SeDebugPrivilege 968 dialer.exe Token: SeDebugPrivilege 5020 powershell.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1084 1984 Cheat_by_DioZ.exe 83 PID 1984 wrote to memory of 1084 1984 Cheat_by_DioZ.exe 83 PID 1984 wrote to memory of 1844 1984 Cheat_by_DioZ.exe 84 PID 1984 wrote to memory of 1844 1984 Cheat_by_DioZ.exe 84 PID 1084 wrote to memory of 4980 1084 3S.exe 86 PID 1084 wrote to memory of 4980 1084 3S.exe 86 PID 4696 wrote to memory of 432 4696 cmd.exe 96 PID 4696 wrote to memory of 432 4696 cmd.exe 96 PID 4696 wrote to memory of 1628 4696 cmd.exe 97 PID 4696 wrote to memory of 1628 4696 cmd.exe 97 PID 4696 wrote to memory of 1324 4696 cmd.exe 98 PID 4696 wrote to memory of 1324 4696 cmd.exe 98 PID 4696 wrote to memory of 4976 4696 cmd.exe 99 PID 4696 wrote to memory of 4976 4696 cmd.exe 99 PID 4696 wrote to memory of 2896 4696 cmd.exe 100 PID 4696 wrote to memory of 2896 4696 cmd.exe 100 PID 1844 wrote to memory of 968 1844 MS.exe 103 PID 1156 wrote to memory of 2040 1156 cmd.exe 106 PID 1156 wrote to memory of 2040 1156 cmd.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\Cheat_by_DioZ.exe"C:\Users\Admin\AppData\Local\Temp\Cheat_by_DioZ.exe"2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3S.exe"C:\Users\Admin\AppData\Local\Temp\3S.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\MS.exe"C:\Users\Admin\AppData\Local\Temp\MS.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:432
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1628
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1324
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:4976
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:2896
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:2040
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4912
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:2780
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:1768
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#cnxaozlt#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 460 -p 1020 -ip 10201⤵PID:2060
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1020 -s 36201⤵
- Program crash
PID:3520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
227KB
MD50c6f57e34c60e926869925974c0ba0c6
SHA1c2c96e1a4da5fe008796801569ebdfcde4d3c07b
SHA2563818bc71c250768baec123373d2e873428509f7dcef12a56f4d428d488661c71
SHA51270281ccd28331260e0808d00a0965753e4f8d9c4b8a0e211abd97556429ad7cb3a647a017f53a8d111468639fe9c05e0022cb034f6069b6b9fff214d389ac193
-
Filesize
227KB
MD50c6f57e34c60e926869925974c0ba0c6
SHA1c2c96e1a4da5fe008796801569ebdfcde4d3c07b
SHA2563818bc71c250768baec123373d2e873428509f7dcef12a56f4d428d488661c71
SHA51270281ccd28331260e0808d00a0965753e4f8d9c4b8a0e211abd97556429ad7cb3a647a017f53a8d111468639fe9c05e0022cb034f6069b6b9fff214d389ac193
-
Filesize
227KB
MD50c6f57e34c60e926869925974c0ba0c6
SHA1c2c96e1a4da5fe008796801569ebdfcde4d3c07b
SHA2563818bc71c250768baec123373d2e873428509f7dcef12a56f4d428d488661c71
SHA51270281ccd28331260e0808d00a0965753e4f8d9c4b8a0e211abd97556429ad7cb3a647a017f53a8d111468639fe9c05e0022cb034f6069b6b9fff214d389ac193
-
Filesize
9.9MB
MD5ed1da88dca5699f9e01a7e4fa08be78c
SHA11cc67cbe8cf95217bd7f22a1e30702bf9d45e806
SHA2569773bcd1383410649884abe2985277f4d51e839f6f49446d13ab67e0bd18f413
SHA5124e5a80bbe65c90a25b6f7907acf269c46ddb0ad09ac859c806e03e3aa0854afcb4d08e1e4176b8dfe9b852b91f7bf1ab510f53ae6945b654083561ecc7a7e2ef
-
Filesize
9.9MB
MD5ed1da88dca5699f9e01a7e4fa08be78c
SHA11cc67cbe8cf95217bd7f22a1e30702bf9d45e806
SHA2569773bcd1383410649884abe2985277f4d51e839f6f49446d13ab67e0bd18f413
SHA5124e5a80bbe65c90a25b6f7907acf269c46ddb0ad09ac859c806e03e3aa0854afcb4d08e1e4176b8dfe9b852b91f7bf1ab510f53ae6945b654083561ecc7a7e2ef
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82