Analysis

  • max time kernel
    91s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2024 02:18

General

  • Target

    HavocV2.exe

  • Size

    395KB

  • MD5

    bbd057262f45309b69aac1969de8905d

  • SHA1

    be351afb488c78f984213d8b8fceb0792c00414a

  • SHA256

    d223ace00adcf9996234b0e5f85b14ca273ead2c01672f7abc8469cfeacf1408

  • SHA512

    caf0791490f568c2ac5b2242a638a8ff557916d390470b5e04acd6c3bd49a3a69be3ae015a2eb4f10624f8cbd54b99c539011da820ef949ad17b1db88e46b12d

  • SSDEEP

    6144:7loZM+rIkd8g+EtXHkv/iD4LD/xEKtFuHr20VJgU0b8e1m/lm4iUG:ZoZtL+EP8LD/xEKtFuHr20VJghzBh

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HavocV2.exe
    "C:\Users\Admin\AppData\Local\Temp\HavocV2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4848
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1492

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4848-0-0x000001EFF9030000-0x000001EFF9098000-memory.dmp

    Filesize

    416KB

  • memory/4848-2-0x000001EFF94F0000-0x000001EFF9500000-memory.dmp

    Filesize

    64KB

  • memory/4848-1-0x00007FF9D7B80000-0x00007FF9D8641000-memory.dmp

    Filesize

    10.8MB

  • memory/4848-4-0x00007FF9D7B80000-0x00007FF9D8641000-memory.dmp

    Filesize

    10.8MB