Analysis

  • max time kernel
    71s
  • max time network
    78s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231129-en
  • resource tags

    arch:x64arch:x86image:win11-20231129-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-12-2023 22:46

General

  • Target

    HWID.exe

  • Size

    142KB

  • MD5

    9d56d51792b9a4374f1d83673d07f30f

  • SHA1

    4fc9c3c5fc06706af8451d895abb392350d5e53b

  • SHA256

    6e9b99bf972b0f87f6c658142f58d2afe0a105108d03653d9e768118c831493f

  • SHA512

    6ab0046f29b0e3af89350ece266efd8c0ab81ee8b5b7c4168e16767a92783d9438f443b52b33964fadb5fd79a71321cefe3a8ecad3c0cb8581e1e885a934f006

  • SSDEEP

    3072:TvJzTugv8nBvQ89ynM8Fg+V0PqCkxY5ki8Q1o7XsUDCD:Thzygv8n9x9W3qJkxY5kfEo7T2

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1182449804958248970/DRF0ya2e3evg84K0Bvj6KDwl3i7xtSWZ3g0gIs0o-TUVRK-JP1st19-yHi5V8uo23sfe

Extracted

Family

xworm

C2

owner-cc.gl.at.ply.gg:32281

Attributes
  • Install_directory

    %AppData%

  • install_file

    WindowsSoundSystem.exe

Signatures

  • Detect Umbral payload 8 IoCs
  • Detect Xworm Payload 6 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HWID.exe
    "C:\Users\Admin\AppData\Local\Temp\HWID.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe
      "C:\Users\Admin\AppData\Local\Temp\MediaPro.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
    • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe
      "C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:5076
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4344
    • C:\Users\Admin\AppData\Local\Temp\HWID.exe
      "C:\Users\Admin\AppData\Local\Temp\HWID.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe
        "C:\Users\Admin\AppData\Local\Temp\MediaPro.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3964
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1868
      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe
        "C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
    • C:\Users\Admin\AppData\Local\Temp\HWID.exe
      "C:\Users\Admin\AppData\Local\Temp\HWID.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe
        "C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe"
        2⤵
        • Executes dropped EXE
        PID:3064
      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe
        "C:\Users\Admin\AppData\Local\Temp\MediaPro.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4820
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
            PID:2324

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HWID.exe.log

        Filesize

        1KB

        MD5

        529d88befdcb9c82af230a03da30f9d2

        SHA1

        faafd7f649d768355060daedcef19d0c46bfffbb

        SHA256

        d4467a14b864014afce828690ec3f85f09cbf661796515c7bcaa9aefac5c0eaa

        SHA512

        5ca250ab149ce6e88e4e68e95c6bfcf8c43db9cd214325f63b7e520fabc64dd8e6ba75d20108af8308a16956ec131a300d5a99e7221c49daa4aa13755e8f13a1

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MediaFMPEG.exe.log

        Filesize

        654B

        MD5

        2cbbb74b7da1f720b48ed31085cbd5b8

        SHA1

        79caa9a3ea8abe1b9c4326c3633da64a5f724964

        SHA256

        e31b18f21621d9983bfdf1ea3e53884a9d58b8ffd79e0e5790da6f3a81a8b9d3

        SHA512

        ecf02d5240e0c1c005d3ab393aa7eff62bd498c2db5905157e2bf6d29e1b663228a9583950842629d1a4caef404c8941a0c7799b1a3bd1eb890a09fdb7efcff9

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\MediaPro.exe.log

        Filesize

        1KB

        MD5

        02df789e3c730b309fc4d9abce5d729b

        SHA1

        4f9da0f0d4cadacfd0f68fb1f7ee73a66dcf1b4e

        SHA256

        4afabcd1723096359d90c8f32df7a6a44cd866e89d5b37c89280bfeab61d7321

        SHA512

        7ac0dd7e3a3e483d07409da793dd2b0915d4369fe41fe743acd82de9aa77b9fa7ea5cd60498034f3fa0674d93d184c9128375d8f7f0796fddecff3845fca8587

      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe

        Filesize

        64KB

        MD5

        99ddf6a151421800d4dfad68d91d927b

        SHA1

        b4755386907a1b5dd1f5880bc052d82c341bbbeb

        SHA256

        2e82fc1be4a91982899744ff91a3552e40007119e7422bbb0a2ceb6913a3eb35

        SHA512

        89e61b9d8351b062877ef3900aa4cf2c8cec8eb6eac0d5f68ea727bfd2142f23d5c9d30a83fdc375d225f3f8811c84ad301ee25a8210510793725630454f9e87

      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe

        Filesize

        64KB

        MD5

        99ddf6a151421800d4dfad68d91d927b

        SHA1

        b4755386907a1b5dd1f5880bc052d82c341bbbeb

        SHA256

        2e82fc1be4a91982899744ff91a3552e40007119e7422bbb0a2ceb6913a3eb35

        SHA512

        89e61b9d8351b062877ef3900aa4cf2c8cec8eb6eac0d5f68ea727bfd2142f23d5c9d30a83fdc375d225f3f8811c84ad301ee25a8210510793725630454f9e87

      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe

        Filesize

        64KB

        MD5

        99ddf6a151421800d4dfad68d91d927b

        SHA1

        b4755386907a1b5dd1f5880bc052d82c341bbbeb

        SHA256

        2e82fc1be4a91982899744ff91a3552e40007119e7422bbb0a2ceb6913a3eb35

        SHA512

        89e61b9d8351b062877ef3900aa4cf2c8cec8eb6eac0d5f68ea727bfd2142f23d5c9d30a83fdc375d225f3f8811c84ad301ee25a8210510793725630454f9e87

      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe

        Filesize

        64KB

        MD5

        99ddf6a151421800d4dfad68d91d927b

        SHA1

        b4755386907a1b5dd1f5880bc052d82c341bbbeb

        SHA256

        2e82fc1be4a91982899744ff91a3552e40007119e7422bbb0a2ceb6913a3eb35

        SHA512

        89e61b9d8351b062877ef3900aa4cf2c8cec8eb6eac0d5f68ea727bfd2142f23d5c9d30a83fdc375d225f3f8811c84ad301ee25a8210510793725630454f9e87

      • C:\Users\Admin\AppData\Local\Temp\MediaFMPEG.exe

        Filesize

        64KB

        MD5

        99ddf6a151421800d4dfad68d91d927b

        SHA1

        b4755386907a1b5dd1f5880bc052d82c341bbbeb

        SHA256

        2e82fc1be4a91982899744ff91a3552e40007119e7422bbb0a2ceb6913a3eb35

        SHA512

        89e61b9d8351b062877ef3900aa4cf2c8cec8eb6eac0d5f68ea727bfd2142f23d5c9d30a83fdc375d225f3f8811c84ad301ee25a8210510793725630454f9e87

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • C:\Users\Admin\AppData\Local\Temp\MediaPro.exe

        Filesize

        229KB

        MD5

        fc9e510f55135245c1941e024acbafa0

        SHA1

        ed386ee1a7ee1172e64c25599dabc0e80ce76633

        SHA256

        f52ca778f7b6c0d6bff56549c1e8d06dcf02a79382c7e39ab2bad261ae1f03d6

        SHA512

        c4883fb0e0b7b6a1342cb1dadbcab6aefd8e508f3478e541656f092a7e633cdb38cb07e6f0f0e82e6941ba6205bc3007462de6e83a03701911b76f9adbfc8056

      • memory/1984-65-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/1984-60-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/1988-33-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/1988-22-0x0000021997150000-0x0000021997190000-memory.dmp

        Filesize

        256KB

      • memory/1988-30-0x00000219975F0000-0x0000021997600000-memory.dmp

        Filesize

        64KB

      • memory/1988-28-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/2472-42-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/2472-58-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/2472-44-0x0000000000D40000-0x0000000000D50000-memory.dmp

        Filesize

        64KB

      • memory/3064-85-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/3064-81-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/3680-1-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/3680-0-0x0000000000F90000-0x0000000000FBA000-memory.dmp

        Filesize

        168KB

      • memory/3680-2-0x000000001C100000-0x000000001C110000-memory.dmp

        Filesize

        64KB

      • memory/3680-27-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/3964-61-0x00000277EE0C0000-0x00000277EE0D0000-memory.dmp

        Filesize

        64KB

      • memory/3964-62-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/3964-59-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/4820-82-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/4820-84-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/4820-83-0x000002AB7E5A0000-0x000002AB7E5B0000-memory.dmp

        Filesize

        64KB

      • memory/5048-63-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/5048-80-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/5048-66-0x0000000001770000-0x0000000001780000-memory.dmp

        Filesize

        64KB

      • memory/5076-34-0x000000001B240000-0x000000001B250000-memory.dmp

        Filesize

        64KB

      • memory/5076-31-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB

      • memory/5076-40-0x000000001B240000-0x000000001B250000-memory.dmp

        Filesize

        64KB

      • memory/5076-29-0x00000000005B0000-0x00000000005C6000-memory.dmp

        Filesize

        88KB

      • memory/5076-39-0x00007FFBAAF90000-0x00007FFBABA52000-memory.dmp

        Filesize

        10.8MB