Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231201-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231201-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-12-2023 03:18

General

  • Target

    RC7/RC7.exe

  • Size

    160KB

  • MD5

    40e89aaf41d4ebda079572167d4665e7

  • SHA1

    c14a019a862aa3f595da7d15cc993f4f894d10a5

  • SHA256

    95388dfe045e7e976186c3ab0286ed8aa77bdb299c867f8c3e46f23ff7624a4d

  • SHA512

    035996ef789c0dc972265ec04652d01e1a530e61d4dfdd3fadc6e502a46b054e2b88fd5347d63deba491924b67c466996208f33f9a5019eb60923445551ce554

  • SSDEEP

    3072:Vjt4sK0uoEz8jh6oKyIPw+lV59i/XvGO0EFA0K+ymEN4NI:VjysKJ8cNP779Wvwc19yx

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1179573880306806895/9PPafRuKqunRXMBgRp7lwh-lO7PV6gpu6bih39np__mk8ZAghkJ95dBDKUvofe3l-iRe

Extracted

Family

xworm

C2

owner-cc.gl.at.ply.gg:32281

Attributes
  • install_file

    USB.exe

Signatures

  • Detect Umbral payload 4 IoCs
  • Detect Xworm Payload 4 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RC7\RC7.exe
    "C:\Users\Admin\AppData\Local\Temp\RC7\RC7.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:536
    • C:\Users\Admin\AppData\Local\Temp\Umbral1.exe
      "C:\Users\Admin\AppData\Local\Temp\Umbral1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5088
    • C:\Users\Admin\AppData\Local\Temp\XClient.exe
      "C:\Users\Admin\AppData\Local\Temp\XClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Umbral1.exe

    Filesize

    231KB

    MD5

    5c04d1b604c881ae86da044c2d16b8b2

    SHA1

    c9f98d064e8284a51d43d72c15211fdd6edee1c8

    SHA256

    5b0ae3b59dcfbdf94878f652d328c12b61b0783082046815bc6d01fecd8fd769

    SHA512

    d156d5cab74668e2899aaced344d6d4e8e89eaaa6936c8378f89126747543f063066dd6c91e39203cbad0dfc9027aef5853775cef47751b669de6336d97223d6

  • C:\Users\Admin\AppData\Local\Temp\Umbral1.exe

    Filesize

    231KB

    MD5

    5c04d1b604c881ae86da044c2d16b8b2

    SHA1

    c9f98d064e8284a51d43d72c15211fdd6edee1c8

    SHA256

    5b0ae3b59dcfbdf94878f652d328c12b61b0783082046815bc6d01fecd8fd769

    SHA512

    d156d5cab74668e2899aaced344d6d4e8e89eaaa6936c8378f89126747543f063066dd6c91e39203cbad0dfc9027aef5853775cef47751b669de6336d97223d6

  • C:\Users\Admin\AppData\Local\Temp\Umbral1.exe

    Filesize

    231KB

    MD5

    5c04d1b604c881ae86da044c2d16b8b2

    SHA1

    c9f98d064e8284a51d43d72c15211fdd6edee1c8

    SHA256

    5b0ae3b59dcfbdf94878f652d328c12b61b0783082046815bc6d01fecd8fd769

    SHA512

    d156d5cab74668e2899aaced344d6d4e8e89eaaa6936c8378f89126747543f063066dd6c91e39203cbad0dfc9027aef5853775cef47751b669de6336d97223d6

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    60KB

    MD5

    fd41a98611978677f1adc60f86383ea0

    SHA1

    200cfd48d7f7d28cff9c177cdd804e6fd578c015

    SHA256

    ffc549f9e84b6ecaa96e1cb49c18a8bdd89d536e0556962c88995967009cdc3d

    SHA512

    87a0d544d9b1dd2b53d40cd54d2c6955927dc287d2cf557eb50f408c3e6002efdac3ecbe908b49bf153bb9276d23e3e459bbaa502167cc52a63ae08a40251270

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    60KB

    MD5

    fd41a98611978677f1adc60f86383ea0

    SHA1

    200cfd48d7f7d28cff9c177cdd804e6fd578c015

    SHA256

    ffc549f9e84b6ecaa96e1cb49c18a8bdd89d536e0556962c88995967009cdc3d

    SHA512

    87a0d544d9b1dd2b53d40cd54d2c6955927dc287d2cf557eb50f408c3e6002efdac3ecbe908b49bf153bb9276d23e3e459bbaa502167cc52a63ae08a40251270

  • C:\Users\Admin\AppData\Local\Temp\XClient.exe

    Filesize

    60KB

    MD5

    fd41a98611978677f1adc60f86383ea0

    SHA1

    200cfd48d7f7d28cff9c177cdd804e6fd578c015

    SHA256

    ffc549f9e84b6ecaa96e1cb49c18a8bdd89d536e0556962c88995967009cdc3d

    SHA512

    87a0d544d9b1dd2b53d40cd54d2c6955927dc287d2cf557eb50f408c3e6002efdac3ecbe908b49bf153bb9276d23e3e459bbaa502167cc52a63ae08a40251270

  • memory/536-29-0x00007FFB66000000-0x00007FFB66AC1000-memory.dmp

    Filesize

    10.8MB

  • memory/536-3-0x000000001BC80000-0x000000001BC90000-memory.dmp

    Filesize

    64KB

  • memory/536-1-0x00007FFB66000000-0x00007FFB66AC1000-memory.dmp

    Filesize

    10.8MB

  • memory/536-0-0x0000000000FB0000-0x0000000000FDE000-memory.dmp

    Filesize

    184KB

  • memory/2272-26-0x000001CF4E9C0000-0x000001CF4EA00000-memory.dmp

    Filesize

    256KB

  • memory/2272-30-0x000001CF68F30000-0x000001CF68F40000-memory.dmp

    Filesize

    64KB

  • memory/2272-31-0x00007FFB66000000-0x00007FFB66AC1000-memory.dmp

    Filesize

    10.8MB

  • memory/2272-33-0x00007FFB66000000-0x00007FFB66AC1000-memory.dmp

    Filesize

    10.8MB

  • memory/2964-28-0x00007FFB66000000-0x00007FFB66AC1000-memory.dmp

    Filesize

    10.8MB

  • memory/2964-27-0x0000000000030000-0x0000000000046000-memory.dmp

    Filesize

    88KB

  • memory/2964-34-0x000000001AD40000-0x000000001AD50000-memory.dmp

    Filesize

    64KB

  • memory/2964-35-0x00007FFB66000000-0x00007FFB66AC1000-memory.dmp

    Filesize

    10.8MB

  • memory/2964-36-0x000000001AD40000-0x000000001AD50000-memory.dmp

    Filesize

    64KB