Overview
overview
10Static
static
10primordial...ed.exe
windows7-x64
10primordial...ed.exe
windows10-1703-x64
10primordial...ed.exe
windows10-2004-x64
10primordial...ed.exe
windows11-21h2-x64
10primordialV2.dll
windows7-x64
1primordialV2.dll
windows10-1703-x64
1primordialV2.dll
windows10-2004-x64
1primordialV2.dll
windows11-21h2-x64
1Analysis
-
max time kernel
455s -
max time network
457s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
17-02-2024 09:50
Behavioral task
behavioral1
Sample
primordial loader cracked.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
primordial loader cracked.exe
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
primordial loader cracked.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral4
Sample
primordial loader cracked.exe
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
primordialV2.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
primordialV2.dll
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
primordialV2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
primordialV2.dll
Resource
win11-20240214-en
General
-
Target
primordial loader cracked.exe
-
Size
229KB
-
MD5
aade2822bd0471da2ed5a068a099fb1b
-
SHA1
39e9fbd333650353aff09f6f0f66a3d1d6dcdd14
-
SHA256
00201eadd8efe516d68a7b736bd3b66635ad9bd5c7ede630bd2a85edf2d3f97d
-
SHA512
0dbb3f78c8034330010bc02053b382489243a69a9a2d179f96b34715acf8b805c824e2efbf13ba870e570138a9aecb3e7696167cd9f264bc4bd750dd3da545dc
-
SSDEEP
6144:7loZM99EBt/SqctonEPfCqArWu/p3cw/3eHp0AVwpJ8e1muf8:ZoZvFSqcwvrWu/p3cw/3eHp0AVCVk
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral3/memory/1680-0-0x0000019199FF0000-0x000001919A030000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 1680 primordial loader cracked.exe Token: SeIncreaseQuotaPrivilege 368 wmic.exe Token: SeSecurityPrivilege 368 wmic.exe Token: SeTakeOwnershipPrivilege 368 wmic.exe Token: SeLoadDriverPrivilege 368 wmic.exe Token: SeSystemProfilePrivilege 368 wmic.exe Token: SeSystemtimePrivilege 368 wmic.exe Token: SeProfSingleProcessPrivilege 368 wmic.exe Token: SeIncBasePriorityPrivilege 368 wmic.exe Token: SeCreatePagefilePrivilege 368 wmic.exe Token: SeBackupPrivilege 368 wmic.exe Token: SeRestorePrivilege 368 wmic.exe Token: SeShutdownPrivilege 368 wmic.exe Token: SeDebugPrivilege 368 wmic.exe Token: SeSystemEnvironmentPrivilege 368 wmic.exe Token: SeRemoteShutdownPrivilege 368 wmic.exe Token: SeUndockPrivilege 368 wmic.exe Token: SeManageVolumePrivilege 368 wmic.exe Token: 33 368 wmic.exe Token: 34 368 wmic.exe Token: 35 368 wmic.exe Token: 36 368 wmic.exe Token: SeIncreaseQuotaPrivilege 368 wmic.exe Token: SeSecurityPrivilege 368 wmic.exe Token: SeTakeOwnershipPrivilege 368 wmic.exe Token: SeLoadDriverPrivilege 368 wmic.exe Token: SeSystemProfilePrivilege 368 wmic.exe Token: SeSystemtimePrivilege 368 wmic.exe Token: SeProfSingleProcessPrivilege 368 wmic.exe Token: SeIncBasePriorityPrivilege 368 wmic.exe Token: SeCreatePagefilePrivilege 368 wmic.exe Token: SeBackupPrivilege 368 wmic.exe Token: SeRestorePrivilege 368 wmic.exe Token: SeShutdownPrivilege 368 wmic.exe Token: SeDebugPrivilege 368 wmic.exe Token: SeSystemEnvironmentPrivilege 368 wmic.exe Token: SeRemoteShutdownPrivilege 368 wmic.exe Token: SeUndockPrivilege 368 wmic.exe Token: SeManageVolumePrivilege 368 wmic.exe Token: 33 368 wmic.exe Token: 34 368 wmic.exe Token: 35 368 wmic.exe Token: 36 368 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1680 wrote to memory of 368 1680 primordial loader cracked.exe 84 PID 1680 wrote to memory of 368 1680 primordial loader cracked.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\primordial loader cracked.exe"C:\Users\Admin\AppData\Local\Temp\primordial loader cracked.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:368
-