Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    12-09-2023 12:24

General

  • Target

    tmp.exe

  • Size

    230KB

  • MD5

    9b8f2f4b5dd94329b4f79b9a829d73ae

  • SHA1

    a8f7cc119eebfe74a5c8e37b72f784270acc9976

  • SHA256

    89942c4a6e1e3f33fa950549133aca7dcc154c7d88cea43d78aa3669de12eba6

  • SHA512

    6ef635a35083573e5d142d7a900c60bc32b8096b31762d6f08fd8b532b518a40eef59f8be44e34699f4a624c47bdbb639051877d305588761868bb93c2523c50

  • SSDEEP

    6144:9loZMYrIkd8g+EtXHkv/iD4sf9Ghv0IHx2PxM4dVHb8e1m+i:foZvL+EP8sf9Ghv0IHx2PxM4d54

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2932-0-0x0000000000160000-0x00000000001A0000-memory.dmp

    Filesize

    256KB

  • memory/2932-1-0x000007FEF5840000-0x000007FEF622C000-memory.dmp

    Filesize

    9.9MB

  • memory/2932-2-0x000000001B0D0000-0x000000001B150000-memory.dmp

    Filesize

    512KB

  • memory/2932-3-0x000007FEF5840000-0x000007FEF622C000-memory.dmp

    Filesize

    9.9MB