Analysis

  • max time kernel
    1561s
  • max time network
    1565s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2023 05:11

General

  • Target

    celex-main.exe

  • Size

    229KB

  • MD5

    c876042a9dc5dc33a953a49aa676524f

  • SHA1

    359f4ce116552d3118b0d866c974ef127dd3d76f

  • SHA256

    d8f6b5f8af4f9741a4f4c8b3b8bb3618120944b660eb6387ca8d3f0bb3d6d8d6

  • SHA512

    31f6087e90927c64bef27535321a679f7bd1f00e5c54ae52460b63c56244a8134dd47428627c9f8c99c13478a556fe4506a99f32664d64b6258b73c5c8221aaa

  • SSDEEP

    3072:rmpcjvqySgPA9+D9Cocawot18PeXndP5xHki0sMXSl8eN7sbXKcGTSYE:WcWoPAQRrt18ePxHk7y8eNYOpS

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\celex-main.exe
    "C:\Users\Admin\AppData\Local\Temp\celex-main.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:544
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2228

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2968-54-0x0000000000980000-0x00000000009BE000-memory.dmp

      Filesize

      248KB

    • memory/2968-55-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-56-0x000000001B0B0000-0x000000001B130000-memory.dmp

      Filesize

      512KB

    • memory/2968-57-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

      Filesize

      9.9MB

    • memory/2968-58-0x000000001B0B0000-0x000000001B130000-memory.dmp

      Filesize

      512KB

    • memory/2968-59-0x000007FEF5DC0000-0x000007FEF67AC000-memory.dmp

      Filesize

      9.9MB