Analysis
-
max time kernel
193s -
max time network
211s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
29-12-2023 01:09
Static task
static1
1 signatures
General
-
Target
Neo_Perm.exe
-
Size
1.2MB
-
MD5
d4041cc3e5034ae1ef88af893b2f5b15
-
SHA1
b4a5312e96d4618b067b2865ec75b88806162ccc
-
SHA256
93223f738657509b016c39bb9d2c7728d698391afe35ce95fb775c32e2d11c3b
-
SHA512
0b3eaa222ec8905bc3163eca5abef8ab1cd39d4c898f3e617dd1257c98f3c8fd533898cc5f91006416bd5a82c23db0ac3400a3f74beda34e2c54d9ba1b1605c7
-
SSDEEP
24576:5GKxdvVStCsVR+bkSe/oREP64Ng0o48I0zEMM:wKxdvcQsVRm/+j6DRFREMM
Malware Config
Extracted
Family
umbral
C2
https://discord.com/api/webhooks/1190042379600797716/_o3srVE7TGd9h-tXYsjqIoul_MAhdkguDLRahVco32Q3wx_y9SxlyFBxvxjJsCXHT46C
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/5752-2-0x00000000002F0000-0x00000000006AC000-memory.dmp family_umbral behavioral1/memory/5752-5-0x00000000002F0000-0x00000000006AC000-memory.dmp family_umbral -
Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
pid Process 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe 5752 Neo_Perm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5752 Neo_Perm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5752 Neo_Perm.exe