Analysis

  • max time kernel
    163s
  • max time network
    198s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231222-en
  • resource tags

    arch:x64arch:x86image:win11-20231222-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04-01-2024 17:06

General

  • Target

    lazedebugobf.rar

  • Size

    81KB

  • MD5

    cb595ccd6ed603a941fdcfea3e02c28f

  • SHA1

    7a837f13827677113816d0c91ecd3c05c493a150

  • SHA256

    36399eb1f9e05f38e756936ba09df8d1abe65a6b57204f01ffc607590f43a6c8

  • SHA512

    cf970e14b070370dd3b9ccc9bae831d9d2cf1298439ccff80698196eb28faef47d2ae7a13f228ed73f4c9533f295776f0fb9733a23b4bd2b033e8f483cd89c6b

  • SSDEEP

    1536:6UbxlxLvxNhKwOHj4FrcUA9uhh3XRNgv65YlA1i3+fOkJPyuWiaKOHJG2s:tbTNhKhHMr3iuhhnRKN+C+ftauTaKOoH

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1005024150882099240/khYBJOc4FQNJuv-BvZjBBTykGgJUimQ5GLYiEAUjKfqFwzv4plf4HvRFL0bMjUAAW-6N

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\lazedebugobf.rar
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\lazedebugobf.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1680
  • C:\Users\Admin\Desktop\laze_obf019593.exe
    "C:\Users\Admin\Desktop\laze_obf019593.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4764
  • C:\Users\Admin\Desktop\laze_obf019593.exe
    "C:\Users\Admin\Desktop\laze_obf019593.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\laze_obf019593.exe.log

    Filesize

    1KB

    MD5

    02df789e3c730b309fc4d9abce5d729b

    SHA1

    4f9da0f0d4cadacfd0f68fb1f7ee73a66dcf1b4e

    SHA256

    4afabcd1723096359d90c8f32df7a6a44cd866e89d5b37c89280bfeab61d7321

    SHA512

    7ac0dd7e3a3e483d07409da793dd2b0915d4369fe41fe743acd82de9aa77b9fa7ea5cd60498034f3fa0674d93d184c9128375d8f7f0796fddecff3845fca8587

  • C:\Users\Admin\Desktop\laze_obf019593.exe

    Filesize

    230KB

    MD5

    17a06509725aa934b928ad0848c1103c

    SHA1

    494a6da76c9a4c9472367bc8192ebdd3a3d46195

    SHA256

    9913b7ebda2313d87b11781c88757ac209a0b29af7c4559b63c21a04f71ccc70

    SHA512

    6c24152c258a7da3381276ac07525f691f24cad7925fdf82d94841b511a9a5e704c893267214da59ba41a48f8f5a056789fcfba1b28731e1dbd7a3c20347be8d

  • memory/796-12-0x000001B3B49E0000-0x000001B3B49F0000-memory.dmp

    Filesize

    64KB

  • memory/796-11-0x00007FFF05ED0000-0x00007FFF06992000-memory.dmp

    Filesize

    10.8MB

  • memory/796-13-0x00007FFF05ED0000-0x00007FFF06992000-memory.dmp

    Filesize

    10.8MB

  • memory/2684-4-0x000002C0035D0000-0x000002C003610000-memory.dmp

    Filesize

    256KB

  • memory/2684-5-0x00007FFF05ED0000-0x00007FFF06992000-memory.dmp

    Filesize

    10.8MB

  • memory/2684-6-0x000002C005370000-0x000002C005380000-memory.dmp

    Filesize

    64KB

  • memory/2684-8-0x00007FFF05ED0000-0x00007FFF06992000-memory.dmp

    Filesize

    10.8MB