Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 01:29

General

  • Target

    ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a.exe

  • Size

    1.7MB

  • MD5

    683c060ccca9ee3a5dad65946c8c9a88

  • SHA1

    35a18395cd290cf377fe665aebdfb26e59869a5c

  • SHA256

    ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a

  • SHA512

    63ab8296b245430a3b13d7eea08d89845a32a8c14b7b88bc516a3b45192a2aa10abdd5e0d9483bc72c5f9b57b228ac498dd7166a54dcafefa630b364377063ef

  • SSDEEP

    24576:XHfPkK8FXhOdkO/MHqP0OF8u/N6HH6rrcBpbYTa+cy:PPj8FXodouFDr3Txc

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6f9411b4568ed828772ce578f40ff5b38715d067bdd76616d945f14462351a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\RegAsm.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3876
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4880
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
          PID:4156
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3244
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          3⤵
          • Detects videocard installed
          PID:1968

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      1KB

      MD5

      5315900105942deb090a358a315b06fe

      SHA1

      22fe5d2e1617c31afbafb91c117508d41ef0ce44

      SHA256

      e8bd7d8d1d0437c71aceb032f9fb08dd1147f41c048540254971cc60e95d6cd7

      SHA512

      77e8d15b8c34a1cb01dbee7147987e2cc25c747e0f80d254714a93937a6d2fe08cb5a772cf85ceb8fec56415bfa853234a003173718c4229ba8cfcf2ce6335a6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      17KB

      MD5

      3c9441307822f2b5bb6e24acf726c5b9

      SHA1

      c5a7747e95d7a88622f765ac198ab581c3c9568e

      SHA256

      c316552a7eb1229dc2ee50fcc4c8d9e9761be361cb7ad86ab8aef4a8a992bbfa

      SHA512

      1a543abf52710efd340e139a70e15337fd3317f677819182901afb28d2e6d425f8d271cbbc9c6b0364a1844d5a7c085a3183c0e3f167cceaf687689ce5cff365

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      45548ece82503a650c912ebe7b349eaa

      SHA1

      facecb27778347b9e461c9a888d9438060c4ecac

      SHA256

      1d5b9e1d9d162b1577f16608bf90daaf0eb0ac352baa2799a2ae16db86957be4

      SHA512

      d9d718dac7c913a6bed8007b8aaa492c186e0677a7aba3624aa1870ab36c0fd19196d679727a1701bcbcf4c0b1a122988d230ba5d9e92d023fe6cdf8c4076d20

    • C:\Users\Admin\AppData\Local\Temp\PerfWatson2.exe

      Filesize

      4KB

      MD5

      4398478b509166e712c157aaa263c5f3

      SHA1

      bb71c9af40f200967a2cd97c3262ed447704ec2c

      SHA256

      390034a7eb1f5697715f37a35c427394a9b8dd880183fdd4aea8a540b5b2967a

      SHA512

      7b33c59e61efabd9690d7689c8f52e79d27d11de680e3d8615aa9878141e0a75f166a880aded01c50450b6538d518df22049e981712db01b131a434319c54246

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kzqt0vad.k4x.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/400-1-0x0000000000C80000-0x0000000000E40000-memory.dmp

      Filesize

      1.8MB

    • memory/400-2-0x00000000057C0000-0x00000000057D0000-memory.dmp

      Filesize

      64KB

    • memory/400-12-0x00000000062D0000-0x00000000062E0000-memory.dmp

      Filesize

      64KB

    • memory/400-13-0x0000000006370000-0x0000000006378000-memory.dmp

      Filesize

      32KB

    • memory/400-0-0x0000000074430000-0x0000000074BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/400-16-0x0000000074430000-0x0000000074BE0000-memory.dmp

      Filesize

      7.7MB

    • memory/1896-80-0x0000000002730000-0x0000000002740000-memory.dmp

      Filesize

      64KB

    • memory/1896-82-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/1896-69-0x00000000059F0000-0x0000000005D44000-memory.dmp

      Filesize

      3.3MB

    • memory/1896-66-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/1896-67-0x0000000002730000-0x0000000002740000-memory.dmp

      Filesize

      64KB

    • memory/1896-68-0x0000000002730000-0x0000000002740000-memory.dmp

      Filesize

      64KB

    • memory/3244-89-0x0000000004820000-0x0000000004830000-memory.dmp

      Filesize

      64KB

    • memory/3244-90-0x0000000004820000-0x0000000004830000-memory.dmp

      Filesize

      64KB

    • memory/3244-88-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/3244-91-0x00000000055B0000-0x0000000005904000-memory.dmp

      Filesize

      3.3MB

    • memory/3244-102-0x00000000061F0000-0x000000000623C000-memory.dmp

      Filesize

      304KB

    • memory/3244-104-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/3876-55-0x0000000006200000-0x000000000621E000-memory.dmp

      Filesize

      120KB

    • memory/3876-26-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/3876-54-0x0000000005DB0000-0x0000000006104000-memory.dmp

      Filesize

      3.3MB

    • memory/3876-48-0x0000000005A90000-0x0000000005AF6000-memory.dmp

      Filesize

      408KB

    • memory/3876-56-0x00000000062B0000-0x00000000062FC000-memory.dmp

      Filesize

      304KB

    • memory/3876-57-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/3876-58-0x00000000073D0000-0x0000000007466000-memory.dmp

      Filesize

      600KB

    • memory/3876-60-0x0000000006770000-0x0000000006792000-memory.dmp

      Filesize

      136KB

    • memory/3876-59-0x00000000066F0000-0x000000000670A000-memory.dmp

      Filesize

      104KB

    • memory/3876-61-0x0000000007A20000-0x0000000007FC4000-memory.dmp

      Filesize

      5.6MB

    • memory/3876-42-0x00000000053B0000-0x00000000053D2000-memory.dmp

      Filesize

      136KB

    • memory/3876-64-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/3876-33-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/3876-28-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

      Filesize

      64KB

    • memory/3876-27-0x00000000053F0000-0x0000000005A18000-memory.dmp

      Filesize

      6.2MB

    • memory/3876-49-0x0000000005B70000-0x0000000005BD6000-memory.dmp

      Filesize

      408KB

    • memory/3876-25-0x0000000004BC0000-0x0000000004BF6000-memory.dmp

      Filesize

      216KB

    • memory/4472-24-0x00000000060A0000-0x00000000060BE000-memory.dmp

      Filesize

      120KB

    • memory/4472-23-0x0000000005E20000-0x0000000005E70000-memory.dmp

      Filesize

      320KB

    • memory/4472-84-0x0000000006520000-0x000000000652A000-memory.dmp

      Filesize

      40KB

    • memory/4472-85-0x00000000065B0000-0x00000000065C2000-memory.dmp

      Filesize

      72KB

    • memory/4472-22-0x0000000005DA0000-0x0000000005E16000-memory.dmp

      Filesize

      472KB

    • memory/4472-21-0x00000000050E0000-0x00000000050F0000-memory.dmp

      Filesize

      64KB

    • memory/4472-20-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/4472-19-0x00000000050E0000-0x00000000050F0000-memory.dmp

      Filesize

      64KB

    • memory/4472-18-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB

    • memory/4472-17-0x0000000004E70000-0x0000000004F02000-memory.dmp

      Filesize

      584KB

    • memory/4472-14-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/4472-109-0x0000000074420000-0x0000000074BD0000-memory.dmp

      Filesize

      7.7MB