Resubmissions

19-02-2024 02:04

240219-chgqfagg3z 10

19-02-2024 02:01

240219-cfpm9sha64 10

Analysis

  • max time kernel
    17s
  • max time network
    17s
  • platform
    windows10-1703_x64
  • resource
    win10-20240214-en
  • resource tags

    arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19-02-2024 02:01

General

  • Target

    HavocV2.exe

  • Size

    395KB

  • MD5

    bbd057262f45309b69aac1969de8905d

  • SHA1

    be351afb488c78f984213d8b8fceb0792c00414a

  • SHA256

    d223ace00adcf9996234b0e5f85b14ca273ead2c01672f7abc8469cfeacf1408

  • SHA512

    caf0791490f568c2ac5b2242a638a8ff557916d390470b5e04acd6c3bd49a3a69be3ae015a2eb4f10624f8cbd54b99c539011da820ef949ad17b1db88e46b12d

  • SSDEEP

    6144:7loZM+rIkd8g+EtXHkv/iD4LD/xEKtFuHr20VJgU0b8e1m/lm4iUG:ZoZtL+EP8LD/xEKtFuHr20VJghzBh

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HavocV2.exe
    "C:\Users\Admin\AppData\Local\Temp\HavocV2.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/420-0-0x0000021E20120000-0x0000021E20188000-memory.dmp

    Filesize

    416KB

  • memory/420-1-0x00007FFC599D0000-0x00007FFC5A3BC000-memory.dmp

    Filesize

    9.9MB

  • memory/420-2-0x0000021E20550000-0x0000021E20560000-memory.dmp

    Filesize

    64KB

  • memory/420-4-0x00007FFC599D0000-0x00007FFC5A3BC000-memory.dmp

    Filesize

    9.9MB