Analysis
-
max time kernel
25s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2024 11:44
General
-
Target
vvvv.exe
-
Size
227KB
-
MD5
064412f7742a570af4817b07ffc1da36
-
SHA1
5b2018f24d6d7dc4304598e332a4bd4d8683885b
-
SHA256
9e3e2baed467adc5d52d7e9fa9158937c4006aa8a2f9093f0562e569ba5a1782
-
SHA512
22c32df71079a1549e481068a0890442babfbb07d67519e9b880792a43522a82f44eb29ef0bcf99ef337af81cc0b0d1caa072e56b2201bc1911f5c6ba14453b4
-
SSDEEP
6144:eloZM+rIkd8g+EtXHkv/iD4eqoSHdmOhUU9va6vyDb8e1mDZi:IoZtL+EP8eqoSHdmOhUU9va6vQmA
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2664-0-0x0000023557850000-0x0000023557890000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 2664 vvvv.exe Token: SeIncreaseQuotaPrivilege 3680 wmic.exe Token: SeSecurityPrivilege 3680 wmic.exe Token: SeTakeOwnershipPrivilege 3680 wmic.exe Token: SeLoadDriverPrivilege 3680 wmic.exe Token: SeSystemProfilePrivilege 3680 wmic.exe Token: SeSystemtimePrivilege 3680 wmic.exe Token: SeProfSingleProcessPrivilege 3680 wmic.exe Token: SeIncBasePriorityPrivilege 3680 wmic.exe Token: SeCreatePagefilePrivilege 3680 wmic.exe Token: SeBackupPrivilege 3680 wmic.exe Token: SeRestorePrivilege 3680 wmic.exe Token: SeShutdownPrivilege 3680 wmic.exe Token: SeDebugPrivilege 3680 wmic.exe Token: SeSystemEnvironmentPrivilege 3680 wmic.exe Token: SeRemoteShutdownPrivilege 3680 wmic.exe Token: SeUndockPrivilege 3680 wmic.exe Token: SeManageVolumePrivilege 3680 wmic.exe Token: 33 3680 wmic.exe Token: 34 3680 wmic.exe Token: 35 3680 wmic.exe Token: 36 3680 wmic.exe Token: SeIncreaseQuotaPrivilege 3680 wmic.exe Token: SeSecurityPrivilege 3680 wmic.exe Token: SeTakeOwnershipPrivilege 3680 wmic.exe Token: SeLoadDriverPrivilege 3680 wmic.exe Token: SeSystemProfilePrivilege 3680 wmic.exe Token: SeSystemtimePrivilege 3680 wmic.exe Token: SeProfSingleProcessPrivilege 3680 wmic.exe Token: SeIncBasePriorityPrivilege 3680 wmic.exe Token: SeCreatePagefilePrivilege 3680 wmic.exe Token: SeBackupPrivilege 3680 wmic.exe Token: SeRestorePrivilege 3680 wmic.exe Token: SeShutdownPrivilege 3680 wmic.exe Token: SeDebugPrivilege 3680 wmic.exe Token: SeSystemEnvironmentPrivilege 3680 wmic.exe Token: SeRemoteShutdownPrivilege 3680 wmic.exe Token: SeUndockPrivilege 3680 wmic.exe Token: SeManageVolumePrivilege 3680 wmic.exe Token: 33 3680 wmic.exe Token: 34 3680 wmic.exe Token: 35 3680 wmic.exe Token: 36 3680 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3680 2664 vvvv.exe 84 PID 2664 wrote to memory of 3680 2664 vvvv.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\vvvv.exe"C:\Users\Admin\AppData\Local\Temp\vvvv.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3680
-