Overview
overview
10Static
static
10primordial...ed.exe
windows7-x64
10primordial...ed.exe
windows10-1703-x64
10primordial...ed.exe
windows10-2004-x64
10primordial...ed.exe
windows11-21h2-x64
10primordialV2.dll
windows7-x64
1primordialV2.dll
windows10-1703-x64
1primordialV2.dll
windows10-2004-x64
1primordialV2.dll
windows11-21h2-x64
1Analysis
-
max time kernel
443s -
max time network
452s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-02-2024 09:50
Behavioral task
behavioral1
Sample
primordial loader cracked.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
primordial loader cracked.exe
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
primordial loader cracked.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral4
Sample
primordial loader cracked.exe
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
primordialV2.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
primordialV2.dll
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
primordialV2.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral8
Sample
primordialV2.dll
Resource
win11-20240214-en
General
-
Target
primordial loader cracked.exe
-
Size
229KB
-
MD5
aade2822bd0471da2ed5a068a099fb1b
-
SHA1
39e9fbd333650353aff09f6f0f66a3d1d6dcdd14
-
SHA256
00201eadd8efe516d68a7b736bd3b66635ad9bd5c7ede630bd2a85edf2d3f97d
-
SHA512
0dbb3f78c8034330010bc02053b382489243a69a9a2d179f96b34715acf8b805c824e2efbf13ba870e570138a9aecb3e7696167cd9f264bc4bd750dd3da545dc
-
SSDEEP
6144:7loZM99EBt/SqctonEPfCqArWu/p3cw/3eHp0AVwpJ8e1muf8:ZoZvFSqcwvrWu/p3cw/3eHp0AVCVk
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral4/memory/4204-0-0x00000288BF9F0000-0x00000288BFA30000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4204 primordial loader cracked.exe Token: SeIncreaseQuotaPrivilege 2308 wmic.exe Token: SeSecurityPrivilege 2308 wmic.exe Token: SeTakeOwnershipPrivilege 2308 wmic.exe Token: SeLoadDriverPrivilege 2308 wmic.exe Token: SeSystemProfilePrivilege 2308 wmic.exe Token: SeSystemtimePrivilege 2308 wmic.exe Token: SeProfSingleProcessPrivilege 2308 wmic.exe Token: SeIncBasePriorityPrivilege 2308 wmic.exe Token: SeCreatePagefilePrivilege 2308 wmic.exe Token: SeBackupPrivilege 2308 wmic.exe Token: SeRestorePrivilege 2308 wmic.exe Token: SeShutdownPrivilege 2308 wmic.exe Token: SeDebugPrivilege 2308 wmic.exe Token: SeSystemEnvironmentPrivilege 2308 wmic.exe Token: SeRemoteShutdownPrivilege 2308 wmic.exe Token: SeUndockPrivilege 2308 wmic.exe Token: SeManageVolumePrivilege 2308 wmic.exe Token: 33 2308 wmic.exe Token: 34 2308 wmic.exe Token: 35 2308 wmic.exe Token: 36 2308 wmic.exe Token: SeIncreaseQuotaPrivilege 2308 wmic.exe Token: SeSecurityPrivilege 2308 wmic.exe Token: SeTakeOwnershipPrivilege 2308 wmic.exe Token: SeLoadDriverPrivilege 2308 wmic.exe Token: SeSystemProfilePrivilege 2308 wmic.exe Token: SeSystemtimePrivilege 2308 wmic.exe Token: SeProfSingleProcessPrivilege 2308 wmic.exe Token: SeIncBasePriorityPrivilege 2308 wmic.exe Token: SeCreatePagefilePrivilege 2308 wmic.exe Token: SeBackupPrivilege 2308 wmic.exe Token: SeRestorePrivilege 2308 wmic.exe Token: SeShutdownPrivilege 2308 wmic.exe Token: SeDebugPrivilege 2308 wmic.exe Token: SeSystemEnvironmentPrivilege 2308 wmic.exe Token: SeRemoteShutdownPrivilege 2308 wmic.exe Token: SeUndockPrivilege 2308 wmic.exe Token: SeManageVolumePrivilege 2308 wmic.exe Token: 33 2308 wmic.exe Token: 34 2308 wmic.exe Token: 35 2308 wmic.exe Token: 36 2308 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4204 wrote to memory of 2308 4204 primordial loader cracked.exe 81 PID 4204 wrote to memory of 2308 4204 primordial loader cracked.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\primordial loader cracked.exe"C:\Users\Admin\AppData\Local\Temp\primordial loader cracked.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2308
-