Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2023 01:29

General

  • Target

    ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a.exe

  • Size

    1.7MB

  • MD5

    683c060ccca9ee3a5dad65946c8c9a88

  • SHA1

    35a18395cd290cf377fe665aebdfb26e59869a5c

  • SHA256

    ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a

  • SHA512

    63ab8296b245430a3b13d7eea08d89845a32a8c14b7b88bc516a3b45192a2aa10abdd5e0d9483bc72c5f9b57b228ac498dd7166a54dcafefa630b364377063ef

  • SSDEEP

    24576:XHfPkK8FXhOdkO/MHqP0OF8u/N6HH6rrcBpbYTa+cy:PPj8FXodouFDr3Txc

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 5 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2936
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2424
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:816
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
          PID:2064
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1456
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          3⤵
          • Detects videocard installed
          PID:1396

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1b922d65abec193f86281f13a88abfab

      SHA1

      31b7fd2f91169d5f0e5f2d0053c747208eeef55c

      SHA256

      33684d64d26501dc8b3cfb469044ff6e176bfc5b7b409088745f5baaa83ecc42

      SHA512

      062a991c0b5d1550c7ee237e4a75451aca502b740b9aa55d6de9a750ab9571afa003d12f4e30748da899ad03eeb7367a55a2b1893834c5dffa0703e3e1aa937f

    • C:\Users\Admin\AppData\Local\Temp\Cab6AD6.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar6F6B.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      50788623603c93d143dca6d59c49394d

      SHA1

      1e6629a9a80fab1dde0ad5ff75797279280503d4

      SHA256

      41acb532f0fce8730760787e78fe48a2fcfc00afc102a68264cd3ac9a2bf19ff

      SHA512

      2d89d8fc9ed8f17e079a73c4024a14f22348184b4f52bf12e99007b9e052b080a4535dd44439e565180680a6377f87908fc395e7a428f4d87108d60f6da4865d

    • memory/1456-117-0x0000000002610000-0x0000000002650000-memory.dmp

      Filesize

      256KB

    • memory/1456-116-0x000000006EBE0000-0x000000006F18B000-memory.dmp

      Filesize

      5.7MB

    • memory/1456-118-0x000000006EBE0000-0x000000006F18B000-memory.dmp

      Filesize

      5.7MB

    • memory/1456-119-0x000000006EBE0000-0x000000006F18B000-memory.dmp

      Filesize

      5.7MB

    • memory/2212-1-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2212-2-0x0000000002290000-0x00000000022D0000-memory.dmp

      Filesize

      256KB

    • memory/2212-68-0x0000000000890000-0x0000000000898000-memory.dmp

      Filesize

      32KB

    • memory/2212-67-0x0000000000860000-0x0000000000870000-memory.dmp

      Filesize

      64KB

    • memory/2212-0-0x00000000003A0000-0x0000000000560000-memory.dmp

      Filesize

      1.8MB

    • memory/2212-81-0x0000000074690000-0x0000000074D7E000-memory.dmp

      Filesize

      6.9MB

    • memory/2424-106-0x000000006FB30000-0x00000000700DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2424-105-0x000000006FB30000-0x00000000700DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2424-104-0x0000000002450000-0x0000000002490000-memory.dmp

      Filesize

      256KB

    • memory/2424-103-0x0000000002450000-0x0000000002490000-memory.dmp

      Filesize

      256KB

    • memory/2424-102-0x0000000002450000-0x0000000002490000-memory.dmp

      Filesize

      256KB

    • memory/2424-101-0x000000006FB30000-0x00000000700DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2540-69-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2540-77-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2540-71-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2540-73-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2540-75-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2540-79-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2540-82-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2540-84-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2936-90-0x000000006FB80000-0x000000007012B000-memory.dmp

      Filesize

      5.7MB

    • memory/2936-91-0x000000006FB80000-0x000000007012B000-memory.dmp

      Filesize

      5.7MB

    • memory/2936-95-0x000000006FB80000-0x000000007012B000-memory.dmp

      Filesize

      5.7MB

    • memory/2936-92-0x0000000000220000-0x0000000000260000-memory.dmp

      Filesize

      256KB

    • memory/2936-93-0x0000000000220000-0x0000000000260000-memory.dmp

      Filesize

      256KB

    • memory/2936-94-0x0000000000220000-0x0000000000260000-memory.dmp

      Filesize

      256KB