Overview
overview
10Static
static
3AlphaBlendTextBox.dll
windows11-21h2-x64
1Bunifu_UI_v1.5.3.dll
windows11-21h2-x64
1HWID.exe
windows11-21h2-x64
10RC7/AlphaB...ox.dll
windows11-21h2-x64
1RC7/Bunifu....3.dll
windows11-21h2-x64
1RC7/Monaco.html
windows11-21h2-x64
1RC7/MonacoEditor.html
windows11-21h2-x64
1RC7/RC7.exe
windows11-21h2-x64
10RC7/RC7_UI.exe
windows11-21h2-x64
1RC7/injector.dll
windows11-21h2-x64
1RC7/sxlib.dll
windows11-21h2-x64
1RC7/vs/bas...ain.js
windows11-21h2-x64
1RC7/vs/bas...bat.js
windows11-21h2-x64
1RC7/vs/bas...fee.js
windows11-21h2-x64
1RC7/vs/bas...cpp.js
windows11-21h2-x64
1RC7/vs/bas...arp.js
windows11-21h2-x64
1RC7/vs/bas...csp.js
windows11-21h2-x64
1RC7/vs/bas...css.js
windows11-21h2-x64
1RC7/vs/bas...ile.js
windows11-21h2-x64
1RC7/vs/bas...arp.js
windows11-21h2-x64
1RC7/vs/bas.../go.js
windows11-21h2-x64
1RC7/vs/bas...ars.js
windows11-21h2-x64
1RC7/vs/bas...tml.js
windows11-21h2-x64
1RC7/vs/bas...ini.js
windows11-21h2-x64
1RC7/vs/bas...ava.js
windows11-21h2-x64
1RC7/vs/bas...ess.js
windows11-21h2-x64
1RC7/vs/bas...lua.js
windows11-21h2-x64
1RC7/vs/bas...own.js
windows11-21h2-x64
1RC7/vs/bas...dax.js
windows11-21h2-x64
1RC7/vs/bas...sql.js
windows11-21h2-x64
1RC7/vs/bas...e-c.js
windows11-21h2-x64
1RC7/vs/bas...sql.js
windows11-21h2-x64
1Analysis
-
max time kernel
125s -
max time network
143s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-12-2023 02:39
Static task
static1
Behavioral task
behavioral1
Sample
AlphaBlendTextBox.dll
Resource
win11-20231128-en
Behavioral task
behavioral2
Sample
Bunifu_UI_v1.5.3.dll
Resource
win11-20231128-en
Behavioral task
behavioral3
Sample
HWID.exe
Resource
win11-20231128-en
Behavioral task
behavioral4
Sample
RC7/AlphaBlendTextBox.dll
Resource
win11-20231128-en
Behavioral task
behavioral5
Sample
RC7/Bunifu_UI_v1.5.3.dll
Resource
win11-20231129-en
Behavioral task
behavioral6
Sample
RC7/Monaco.html
Resource
win11-20231129-en
Behavioral task
behavioral7
Sample
RC7/MonacoEditor.html
Resource
win11-20231129-en
Behavioral task
behavioral8
Sample
RC7/RC7.exe
Resource
win11-20231129-en
Behavioral task
behavioral9
Sample
RC7/RC7_UI.exe
Resource
win11-20231129-en
Behavioral task
behavioral10
Sample
RC7/injector.dll
Resource
win11-20231129-en
Behavioral task
behavioral11
Sample
RC7/sxlib.dll
Resource
win11-20231128-en
Behavioral task
behavioral12
Sample
RC7/vs/base/worker/workerMain.js
Resource
win11-20231128-en
Behavioral task
behavioral13
Sample
RC7/vs/basic-languages/bat/bat.js
Resource
win11-20231128-en
Behavioral task
behavioral14
Sample
RC7/vs/basic-languages/coffee/coffee.js
Resource
win11-20231128-en
Behavioral task
behavioral15
Sample
RC7/vs/basic-languages/cpp/cpp.js
Resource
win11-20231128-en
Behavioral task
behavioral16
Sample
RC7/vs/basic-languages/csharp/csharp.js
Resource
win11-20231128-en
Behavioral task
behavioral17
Sample
RC7/vs/basic-languages/csp/csp.js
Resource
win11-20231129-en
Behavioral task
behavioral18
Sample
RC7/vs/basic-languages/css/css.js
Resource
win11-20231129-en
Behavioral task
behavioral19
Sample
RC7/vs/basic-languages/dockerfile/dockerfile.js
Resource
win11-20231129-en
Behavioral task
behavioral20
Sample
RC7/vs/basic-languages/fsharp/fsharp.js
Resource
win11-20231129-en
Behavioral task
behavioral21
Sample
RC7/vs/basic-languages/go/go.js
Resource
win11-20231129-en
Behavioral task
behavioral22
Sample
RC7/vs/basic-languages/handlebars/handlebars.js
Resource
win11-20231129-en
Behavioral task
behavioral23
Sample
RC7/vs/basic-languages/html/html.js
Resource
win11-20231129-en
Behavioral task
behavioral24
Sample
RC7/vs/basic-languages/ini/ini.js
Resource
win11-20231128-en
Behavioral task
behavioral25
Sample
RC7/vs/basic-languages/java/java.js
Resource
win11-20231128-en
Behavioral task
behavioral26
Sample
RC7/vs/basic-languages/less/less.js
Resource
win11-20231128-en
Behavioral task
behavioral27
Sample
RC7/vs/basic-languages/lua/lua.js
Resource
win11-20231129-en
Behavioral task
behavioral28
Sample
RC7/vs/basic-languages/markdown/markdown.js
Resource
win11-20231129-en
Behavioral task
behavioral29
Sample
RC7/vs/basic-languages/msdax/msdax.js
Resource
win11-20231129-en
Behavioral task
behavioral30
Sample
RC7/vs/basic-languages/mysql/mysql.js
Resource
win11-20231128-en
Behavioral task
behavioral31
Sample
RC7/vs/basic-languages/objective-c/objective-c.js
Resource
win11-20231128-en
Behavioral task
behavioral32
Sample
RC7/vs/basic-languages/pgsql/pgsql.js
Resource
win11-20231129-en
General
-
Target
HWID.exe
-
Size
149KB
-
MD5
2c1ec91ada25a4a34441200dd9773c2a
-
SHA1
80154f3f48a32866de9742bed33ebb907086125e
-
SHA256
0f8980228acd3d9dd7bc9208c13a68b244ee903212327e4d350a82010aa37993
-
SHA512
0ff2d7b2ac069c8bb2b381333f896b2d09ee0c0ec23b1943c35ae758adc71bd34c69502fb22208b1bdb568bda8a908ed548f407010d09532664b02d83fde5b99
-
SSDEEP
3072:+r8dXu13UyQlK/UbZcZJuQCdM79xQbj8alpC5cgiTWMolM2i:+r8de1krcsbQuQpUQallgiboF
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1181010758201520208/iCxvWqp_69ofS-eHs5naW1_4vBzPxLSr9zIR5Bso1e4orm8yDICPrre5CTF60DCywY_3
Extracted
xworm
owner-cc.gl.at.ply.gg:32281
-
Install_directory
%AppData%
-
install_file
WindowsSoundSystem.exe
Signatures
-
Detect Umbral payload 4 IoCs
resource yara_rule behavioral3/files/0x000100000002a890-24.dat family_umbral behavioral3/memory/4000-26-0x000001C61AAA0000-0x000001C61AAE0000-memory.dmp family_umbral behavioral3/files/0x000100000002a890-23.dat family_umbral behavioral3/files/0x000100000002a890-18.dat family_umbral -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral3/files/0x000100000002a88f-7.dat family_xworm behavioral3/memory/2736-27-0x0000000000390000-0x00000000003AA000-memory.dmp family_xworm behavioral3/files/0x000100000002a88f-13.dat family_xworm behavioral3/files/0x000100000002a88f-12.dat family_xworm -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSoundSystem.lnk Windows sound.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSoundSystem.lnk Windows sound.exe -
Executes dropped EXE 2 IoCs
pid Process 2736 Windows sound.exe 4000 Windows Blue Tooth.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 4432 HWID.exe Token: SeDebugPrivilege 2736 Windows sound.exe Token: SeDebugPrivilege 4000 Windows Blue Tooth.exe Token: SeIncreaseQuotaPrivilege 1340 wmic.exe Token: SeSecurityPrivilege 1340 wmic.exe Token: SeTakeOwnershipPrivilege 1340 wmic.exe Token: SeLoadDriverPrivilege 1340 wmic.exe Token: SeSystemProfilePrivilege 1340 wmic.exe Token: SeSystemtimePrivilege 1340 wmic.exe Token: SeProfSingleProcessPrivilege 1340 wmic.exe Token: SeIncBasePriorityPrivilege 1340 wmic.exe Token: SeCreatePagefilePrivilege 1340 wmic.exe Token: SeBackupPrivilege 1340 wmic.exe Token: SeRestorePrivilege 1340 wmic.exe Token: SeShutdownPrivilege 1340 wmic.exe Token: SeDebugPrivilege 1340 wmic.exe Token: SeSystemEnvironmentPrivilege 1340 wmic.exe Token: SeRemoteShutdownPrivilege 1340 wmic.exe Token: SeUndockPrivilege 1340 wmic.exe Token: SeManageVolumePrivilege 1340 wmic.exe Token: 33 1340 wmic.exe Token: 34 1340 wmic.exe Token: 35 1340 wmic.exe Token: 36 1340 wmic.exe Token: SeIncreaseQuotaPrivilege 1340 wmic.exe Token: SeSecurityPrivilege 1340 wmic.exe Token: SeTakeOwnershipPrivilege 1340 wmic.exe Token: SeLoadDriverPrivilege 1340 wmic.exe Token: SeSystemProfilePrivilege 1340 wmic.exe Token: SeSystemtimePrivilege 1340 wmic.exe Token: SeProfSingleProcessPrivilege 1340 wmic.exe Token: SeIncBasePriorityPrivilege 1340 wmic.exe Token: SeCreatePagefilePrivilege 1340 wmic.exe Token: SeBackupPrivilege 1340 wmic.exe Token: SeRestorePrivilege 1340 wmic.exe Token: SeShutdownPrivilege 1340 wmic.exe Token: SeDebugPrivilege 1340 wmic.exe Token: SeSystemEnvironmentPrivilege 1340 wmic.exe Token: SeRemoteShutdownPrivilege 1340 wmic.exe Token: SeUndockPrivilege 1340 wmic.exe Token: SeManageVolumePrivilege 1340 wmic.exe Token: 33 1340 wmic.exe Token: 34 1340 wmic.exe Token: 35 1340 wmic.exe Token: 36 1340 wmic.exe Token: SeDebugPrivilege 2736 Windows sound.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2736 4432 HWID.exe 81 PID 4432 wrote to memory of 2736 4432 HWID.exe 81 PID 4432 wrote to memory of 4000 4432 HWID.exe 78 PID 4432 wrote to memory of 4000 4432 HWID.exe 78 PID 4000 wrote to memory of 1340 4000 Windows Blue Tooth.exe 80 PID 4000 wrote to memory of 1340 4000 Windows Blue Tooth.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\HWID.exe"C:\Users\Admin\AppData\Local\Temp\HWID.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7