Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
74s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
05/02/2024, 10:00
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20231215-en
4 signatures
300 seconds
Behavioral task
behavioral2
Sample
Umbral.exe
Resource
win10-20231215-en
4 signatures
300 seconds
Behavioral task
behavioral3
Sample
Umbral.exe
Resource
win10v2004-20231215-en
4 signatures
300 seconds
General
-
Target
Umbral.exe
-
Size
231KB
-
MD5
2bd5664afed4d5821041e61b19f55a30
-
SHA1
8d0f1ea431c0e00b39898a05f4ae37ac55800703
-
SHA256
5e0dce9978369a90f9380c4630f79b2801dd0251f699bee7d7b85f43c51f027e
-
SHA512
991066a886a2fd36246d1fe88a7c62cb6672a7c8821c94a4b1c8df650968a39aa0f1519451d569b9b478a30cd3465fda32da69816b5ce86bd95ccd9a7d781fe7
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4+B/RkqNlOcLWU1pAN8b8e1mKi:joZtL+EP8+B/RkqNlOcLWU1pAa4
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral2/memory/3932-0-0x000001CE44CC0000-0x000001CE44D00000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 3932 Umbral.exe Token: SeIncreaseQuotaPrivilege 664 wmic.exe Token: SeSecurityPrivilege 664 wmic.exe Token: SeTakeOwnershipPrivilege 664 wmic.exe Token: SeLoadDriverPrivilege 664 wmic.exe Token: SeSystemProfilePrivilege 664 wmic.exe Token: SeSystemtimePrivilege 664 wmic.exe Token: SeProfSingleProcessPrivilege 664 wmic.exe Token: SeIncBasePriorityPrivilege 664 wmic.exe Token: SeCreatePagefilePrivilege 664 wmic.exe Token: SeBackupPrivilege 664 wmic.exe Token: SeRestorePrivilege 664 wmic.exe Token: SeShutdownPrivilege 664 wmic.exe Token: SeDebugPrivilege 664 wmic.exe Token: SeSystemEnvironmentPrivilege 664 wmic.exe Token: SeRemoteShutdownPrivilege 664 wmic.exe Token: SeUndockPrivilege 664 wmic.exe Token: SeManageVolumePrivilege 664 wmic.exe Token: 33 664 wmic.exe Token: 34 664 wmic.exe Token: 35 664 wmic.exe Token: 36 664 wmic.exe Token: SeIncreaseQuotaPrivilege 664 wmic.exe Token: SeSecurityPrivilege 664 wmic.exe Token: SeTakeOwnershipPrivilege 664 wmic.exe Token: SeLoadDriverPrivilege 664 wmic.exe Token: SeSystemProfilePrivilege 664 wmic.exe Token: SeSystemtimePrivilege 664 wmic.exe Token: SeProfSingleProcessPrivilege 664 wmic.exe Token: SeIncBasePriorityPrivilege 664 wmic.exe Token: SeCreatePagefilePrivilege 664 wmic.exe Token: SeBackupPrivilege 664 wmic.exe Token: SeRestorePrivilege 664 wmic.exe Token: SeShutdownPrivilege 664 wmic.exe Token: SeDebugPrivilege 664 wmic.exe Token: SeSystemEnvironmentPrivilege 664 wmic.exe Token: SeRemoteShutdownPrivilege 664 wmic.exe Token: SeUndockPrivilege 664 wmic.exe Token: SeManageVolumePrivilege 664 wmic.exe Token: 33 664 wmic.exe Token: 34 664 wmic.exe Token: 35 664 wmic.exe Token: 36 664 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3932 wrote to memory of 664 3932 Umbral.exe 75 PID 3932 wrote to memory of 664 3932 Umbral.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:664
-