Overview
overview
10Static
static
3RC7.zip
windows7-x64
1RC7.zip
windows10-2004-x64
1AlphaBlendTextBox.dll
windows7-x64
1AlphaBlendTextBox.dll
windows10-2004-x64
1Bunifu_UI_v1.5.3.dll
windows7-x64
1Bunifu_UI_v1.5.3.dll
windows10-2004-x64
1HWID.exe
windows7-x64
10HWID.exe
windows10-2004-x64
10RC7/AlphaB...ox.dll
windows7-x64
1RC7/AlphaB...ox.dll
windows10-2004-x64
1RC7/Bunifu....3.dll
windows7-x64
1RC7/Bunifu....3.dll
windows10-2004-x64
1RC7/Monaco.html
windows7-x64
1RC7/Monaco.html
windows10-2004-x64
1RC7/MonacoEditor.html
windows7-x64
1RC7/MonacoEditor.html
windows10-2004-x64
1RC7/RC7.exe
windows7-x64
10RC7/RC7.exe
windows10-2004-x64
10RC7/RC7_UI.exe
windows7-x64
1RC7/RC7_UI.exe
windows10-2004-x64
1RC7/Themes...me.zip
windows7-x64
1RC7/Themes...me.zip
windows10-2004-x64
1RC7/Themes...me.zip
windows7-x64
1RC7/Themes...me.zip
windows10-2004-x64
1RC7/Themes...me.zip
windows7-x64
1RC7/Themes...me.zip
windows10-2004-x64
1RC7/Themes...me.zip
windows7-x64
1RC7/Themes...me.zip
windows10-2004-x64
1RC7/Themes...me.zip
windows7-x64
1RC7/Themes...me.zip
windows10-2004-x64
1RC7/Themes...me.zip
windows7-x64
1RC7/Themes...me.zip
windows10-2004-x64
1Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 03:18
Static task
static1
Behavioral task
behavioral1
Sample
RC7.zip
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
RC7.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral3
Sample
AlphaBlendTextBox.dll
Resource
win7-20231201-en
Behavioral task
behavioral4
Sample
AlphaBlendTextBox.dll
Resource
win10v2004-20231130-en
Behavioral task
behavioral5
Sample
Bunifu_UI_v1.5.3.dll
Resource
win7-20231023-en
Behavioral task
behavioral6
Sample
Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20231127-en
Behavioral task
behavioral7
Sample
HWID.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
HWID.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral9
Sample
RC7/AlphaBlendTextBox.dll
Resource
win7-20231023-en
Behavioral task
behavioral10
Sample
RC7/AlphaBlendTextBox.dll
Resource
win10v2004-20231127-en
Behavioral task
behavioral11
Sample
RC7/Bunifu_UI_v1.5.3.dll
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
RC7/Bunifu_UI_v1.5.3.dll
Resource
win10v2004-20231127-en
Behavioral task
behavioral13
Sample
RC7/Monaco.html
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
RC7/Monaco.html
Resource
win10v2004-20231130-en
Behavioral task
behavioral15
Sample
RC7/MonacoEditor.html
Resource
win7-20231201-en
Behavioral task
behavioral16
Sample
RC7/MonacoEditor.html
Resource
win10v2004-20231130-en
Behavioral task
behavioral17
Sample
RC7/RC7.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
RC7/RC7.exe
Resource
win10v2004-20231201-en
Behavioral task
behavioral19
Sample
RC7/RC7_UI.exe
Resource
win7-20231023-en
Behavioral task
behavioral20
Sample
RC7/RC7_UI.exe
Resource
win10v2004-20231127-en
Behavioral task
behavioral21
Sample
RC7/Themes/Asriel Theme.zip
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
RC7/Themes/Asriel Theme.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral23
Sample
RC7/Themes/Blue Chicago Theme.zip
Resource
win7-20231023-en
Behavioral task
behavioral24
Sample
RC7/Themes/Blue Chicago Theme.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral25
Sample
RC7/Themes/Blue Stripes Theme.zip
Resource
win7-20231020-en
Behavioral task
behavioral26
Sample
RC7/Themes/Blue Stripes Theme.zip
Resource
win10v2004-20231127-en
Behavioral task
behavioral27
Sample
RC7/Themes/Cow Theme.zip
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
RC7/Themes/Cow Theme.zip
Resource
win10v2004-20231201-en
Behavioral task
behavioral29
Sample
RC7/Themes/Emilia Theme.zip
Resource
win7-20231130-en
Behavioral task
behavioral30
Sample
RC7/Themes/Emilia Theme.zip
Resource
win10v2004-20231130-en
Behavioral task
behavioral31
Sample
RC7/Themes/Frozen Winter Theme.zip
Resource
win7-20231129-en
Behavioral task
behavioral32
Sample
RC7/Themes/Frozen Winter Theme.zip
Resource
win10v2004-20231130-en
General
-
Target
HWID.exe
-
Size
149KB
-
MD5
2c1ec91ada25a4a34441200dd9773c2a
-
SHA1
80154f3f48a32866de9742bed33ebb907086125e
-
SHA256
0f8980228acd3d9dd7bc9208c13a68b244ee903212327e4d350a82010aa37993
-
SHA512
0ff2d7b2ac069c8bb2b381333f896b2d09ee0c0ec23b1943c35ae758adc71bd34c69502fb22208b1bdb568bda8a908ed548f407010d09532664b02d83fde5b99
-
SSDEEP
3072:+r8dXu13UyQlK/UbZcZJuQCdM79xQbj8alpC5cgiTWMolM2i:+r8de1krcsbQuQpUQallgiboF
Malware Config
Extracted
xworm
owner-cc.gl.at.ply.gg:32281
-
Install_directory
%AppData%
-
install_file
WindowsSoundSystem.exe
Extracted
umbral
https://discord.com/api/webhooks/1181010758201520208/iCxvWqp_69ofS-eHs5naW1_4vBzPxLSr9zIR5Bso1e4orm8yDICPrre5CTF60DCywY_3
Signatures
-
Detect Umbral payload 4 IoCs
resource yara_rule behavioral8/files/0x00070000000232b4-19.dat family_umbral behavioral8/files/0x00070000000232b4-27.dat family_umbral behavioral8/memory/2432-28-0x000002A9BF580000-0x000002A9BF5C0000-memory.dmp family_umbral behavioral8/files/0x00070000000232b4-26.dat family_umbral -
Detect Xworm Payload 4 IoCs
resource yara_rule behavioral8/files/0x00070000000232b2-7.dat family_xworm behavioral8/files/0x00070000000232b2-12.dat family_xworm behavioral8/files/0x00070000000232b2-13.dat family_xworm behavioral8/memory/4248-17-0x0000000000DA0000-0x0000000000DBA000-memory.dmp family_xworm -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2013768333-4045878716-2922883000-1000\Control Panel\International\Geo\Nation HWID.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSoundSystem.lnk Windows sound.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSoundSystem.lnk Windows sound.exe -
Executes dropped EXE 2 IoCs
pid Process 4248 Windows sound.exe 2432 Windows Blue Tooth.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 4852 HWID.exe Token: SeDebugPrivilege 4248 Windows sound.exe Token: SeDebugPrivilege 2432 Windows Blue Tooth.exe Token: SeIncreaseQuotaPrivilege 3352 wmic.exe Token: SeSecurityPrivilege 3352 wmic.exe Token: SeTakeOwnershipPrivilege 3352 wmic.exe Token: SeLoadDriverPrivilege 3352 wmic.exe Token: SeSystemProfilePrivilege 3352 wmic.exe Token: SeSystemtimePrivilege 3352 wmic.exe Token: SeProfSingleProcessPrivilege 3352 wmic.exe Token: SeIncBasePriorityPrivilege 3352 wmic.exe Token: SeCreatePagefilePrivilege 3352 wmic.exe Token: SeBackupPrivilege 3352 wmic.exe Token: SeRestorePrivilege 3352 wmic.exe Token: SeShutdownPrivilege 3352 wmic.exe Token: SeDebugPrivilege 3352 wmic.exe Token: SeSystemEnvironmentPrivilege 3352 wmic.exe Token: SeRemoteShutdownPrivilege 3352 wmic.exe Token: SeUndockPrivilege 3352 wmic.exe Token: SeManageVolumePrivilege 3352 wmic.exe Token: 33 3352 wmic.exe Token: 34 3352 wmic.exe Token: 35 3352 wmic.exe Token: 36 3352 wmic.exe Token: SeIncreaseQuotaPrivilege 3352 wmic.exe Token: SeSecurityPrivilege 3352 wmic.exe Token: SeTakeOwnershipPrivilege 3352 wmic.exe Token: SeLoadDriverPrivilege 3352 wmic.exe Token: SeSystemProfilePrivilege 3352 wmic.exe Token: SeSystemtimePrivilege 3352 wmic.exe Token: SeProfSingleProcessPrivilege 3352 wmic.exe Token: SeIncBasePriorityPrivilege 3352 wmic.exe Token: SeCreatePagefilePrivilege 3352 wmic.exe Token: SeBackupPrivilege 3352 wmic.exe Token: SeRestorePrivilege 3352 wmic.exe Token: SeShutdownPrivilege 3352 wmic.exe Token: SeDebugPrivilege 3352 wmic.exe Token: SeSystemEnvironmentPrivilege 3352 wmic.exe Token: SeRemoteShutdownPrivilege 3352 wmic.exe Token: SeUndockPrivilege 3352 wmic.exe Token: SeManageVolumePrivilege 3352 wmic.exe Token: 33 3352 wmic.exe Token: 34 3352 wmic.exe Token: 35 3352 wmic.exe Token: 36 3352 wmic.exe Token: SeDebugPrivilege 4248 Windows sound.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4248 4852 HWID.exe 92 PID 4852 wrote to memory of 4248 4852 HWID.exe 92 PID 4852 wrote to memory of 2432 4852 HWID.exe 93 PID 4852 wrote to memory of 2432 4852 HWID.exe 93 PID 2432 wrote to memory of 3352 2432 Windows Blue Tooth.exe 97 PID 2432 wrote to memory of 3352 2432 Windows Blue Tooth.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\HWID.exe"C:\Users\Admin\AppData\Local\Temp\HWID.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"C:\Users\Admin\AppData\Local\Temp\Windows sound.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"C:\Users\Admin\AppData\Local\Temp\Windows Blue Tooth.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
229KB
MD533405e3ec22e3bd98c3339fa179438b6
SHA177134fb582641f0a54007b6ea92c5ad62ef3ed62
SHA256f336096f486e9507e51d6cf172745ab126cd57f98e3b9429e77f488c65a59019
SHA512fa8649a280a4b8099f6c46a71226e8e03388c794c3cdded278128322d612a48a85dfbe7467da2c8079ff4fefde9491e4e867c6e4786bf690f76acbc948880f56
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7
-
Filesize
75KB
MD5cf4187443a0b1f17e74f66723631a822
SHA12e17093723097c3729d29d19da3df6d7e18e37be
SHA2565eed1e22f8d10b33233ff690d9fc10df6e419c7c7d6223230bbd0d8efaa51887
SHA5122f4865810ad1f291018babd5ec627360d460e29647f6383d0afc6c2f219fd78ddb5113cfa3f27d125d0a59216588805f86b7fa78f3b5f4d45d15192f72d134a7