Analysis

  • max time kernel
    103s
  • max time network
    94s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-02-2024 03:07

General

  • Target

    https://github.com/HavocIncorporated/Havoc-Executor/releases/download/Havoc-Executor/Havoc-Executor.rar

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Executes dropped EXE 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/HavocIncorporated/Havoc-Executor/releases/download/Havoc-Executor/Havoc-Executor.rar
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fff6f363cb8,0x7fff6f363cc8,0x7fff6f363cd8
      2⤵
        PID:916
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1920 /prefetch:2
        2⤵
          PID:1472
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:5076
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:8
          2⤵
            PID:2012
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
            2⤵
              PID:1096
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
              2⤵
                PID:3624
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2920 /prefetch:1
                2⤵
                  PID:3568
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4036 /prefetch:8
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3876
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5588 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3692
                • C:\Program Files\7-Zip\7zFM.exe
                  "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Havoc-Executor.rar"
                  2⤵
                  • NTFS ADS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:4232
                  • C:\Users\Admin\AppData\Local\Temp\7zO880A5287\HavocV2.exe
                    "C:\Users\Admin\AppData\Local\Temp\7zO880A5287\HavocV2.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3052
                    • C:\Windows\System32\Wbem\wmic.exe
                      "wmic.exe" csproduct get uuid
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3048
                  • C:\Users\Admin\AppData\Local\Temp\7zO880A4F28\HavocV2.exe
                    "C:\Users\Admin\AppData\Local\Temp\7zO880A4F28\HavocV2.exe"
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5296
                    • C:\Windows\System32\Wbem\wmic.exe
                      "wmic.exe" csproduct get uuid
                      4⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5440
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4932
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1728 /prefetch:1
                  2⤵
                    PID:4432
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1232 /prefetch:1
                    2⤵
                      PID:1884
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2500 /prefetch:1
                      2⤵
                        PID:4544
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1868,9065040267041119231,807552758985413469,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2252 /prefetch:1
                        2⤵
                          PID:3376
                        • C:\Program Files\7-Zip\7zFM.exe
                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Havoc-Executor.rar"
                          2⤵
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of FindShellTrayWindow
                          PID:5920
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:4612
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:4628
                          • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                            "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                            1⤵
                            • Modifies registry class
                            • Suspicious use of SetWindowsHookEx
                            PID:5532

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\HavocV2.exe.log

                            Filesize

                            1KB

                            MD5

                            02df789e3c730b309fc4d9abce5d729b

                            SHA1

                            4f9da0f0d4cadacfd0f68fb1f7ee73a66dcf1b4e

                            SHA256

                            4afabcd1723096359d90c8f32df7a6a44cd866e89d5b37c89280bfeab61d7321

                            SHA512

                            7ac0dd7e3a3e483d07409da793dd2b0915d4369fe41fe743acd82de9aa77b9fa7ea5cd60498034f3fa0674d93d184c9128375d8f7f0796fddecff3845fca8587

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            53b9b1800c90e0f055e0daabb68cc97e

                            SHA1

                            beb76399e32e4ca5c634228e2d4001e197249cf0

                            SHA256

                            edac0665854b4e7aa3f2b866e6172c71b2e1c6a169a2a04cf1e74102ee9c0e5e

                            SHA512

                            87d516b7ae594902b2544e13c6224760e1ec40d676a2f699da3242b5d3a9eb962dc7b3ca7e2a3eed1dac5375cc6fd8379dfe47d127fd3c18a653a05a8f67c31b

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            265B

                            MD5

                            f5cd008cf465804d0e6f39a8d81f9a2d

                            SHA1

                            6b2907356472ed4a719e5675cc08969f30adc855

                            SHA256

                            fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                            SHA512

                            dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                            Filesize

                            111B

                            MD5

                            285252a2f6327d41eab203dc2f402c67

                            SHA1

                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                            SHA256

                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                            SHA512

                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            a8eabebf6de21ac58a7501b046598c94

                            SHA1

                            a0573eb807df018bb5ef0c847ec9bbd20d41d250

                            SHA256

                            c7368fc07c3a63fd60a4307a69277ad8e523020bc082beb3c9c58f5a5b891394

                            SHA512

                            b7ff3efc8278cc48343f6fd5c76e03e275002149ba64e6f9656af2c1f8aa6cb775ed4478d8257543d4c98e72501f6cdd73b3c341e1acc3b7091b4f46359772d8

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            68e2be638590ac9f6037f43d769a3d16

                            SHA1

                            aa37990e579d216974e9589dc319e8b6aa1ee342

                            SHA256

                            c9fc29bb998a06f5718e17101686ea42e04be5feb7c975f81ea27ea2d550908e

                            SHA512

                            2cefd4e106b05166b008b6da9ce9d20398efe8a71f46ca537e8e06fb4ab3ec649220f224317ebd0d41fc19bccf13cf2e9deb60108df1baca66d3609b2d8880a1

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            505aba4286fe7e7e707ae97cba0cfbec

                            SHA1

                            a949de1f35bb4f6843452fa2862782152e1f2a6d

                            SHA256

                            8322540ae40f4f87bdfac744fba799da933dbe88e08303d5054ca7e90e64c3ca

                            SHA512

                            ebc8d78ba71f6583ea8a4dbc6b54720294658ecd1c97649d218909dabbb4c5a98c6fb0b662fe88ae2e2ce559b7c1cc1c226f74dc836d0d2943b6c43885794bdd

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            691aa259eda12d1bdc9ec12917e021fa

                            SHA1

                            6d2ded5165a60fc258f1e88fb3d944079dd0fa73

                            SHA256

                            8bc74afb00dbd0b347a89c1b0f195f45c572cd41adddf1d1a607ef0006e4eba7

                            SHA512

                            3280658e49bee10d31bcf2c9717c811dc88ac091ce9288a86147754713122ff45b92da20bc80784c1a003d66d9f990e7ddda28677312ec2ed315648d16ebe369

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                            Filesize

                            25KB

                            MD5

                            c82ad8ad14e526ec66559c47de1a763f

                            SHA1

                            b10b0f130da2c65e86f90dea7ee0a7023d5c2113

                            SHA256

                            daf64997d996dd9b5fa74cfcf401181709c99c832ecac0765dfa2685a4de2d26

                            SHA512

                            77f20db71a5452fe0de763080ca73b3e55cb0f38bce7805eed977eff6d932b7b081f896be7d9baa8758cb0677e12848f60e08dc2b19985dad0476962b0ffcf66

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                            Filesize

                            16B

                            MD5

                            6752a1d65b201c13b62ea44016eb221f

                            SHA1

                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                            SHA256

                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                            SHA512

                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            10KB

                            MD5

                            f16f2795210a8b96a88899228649bf3c

                            SHA1

                            202ba66dd6913550139d7ad9ea64f2093b56e8bb

                            SHA256

                            e13ab97658a965d15a117b2e1aaa404c006129423789dcc23330b5fdab4ee967

                            SHA512

                            24df28acad60cf6dfe6dc970f14b132a92dbd852214e6fd79bc7a03996022a6714d950870fd5f833dbc3cc23e6cfe657ed3eac91d46f55b2d3296e38d8b5a5ba

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                            Filesize

                            11KB

                            MD5

                            b3da95e1d8408664545b7113e0b6e733

                            SHA1

                            792609498d831efd34deff798621e8b143cea1d7

                            SHA256

                            0d64feeec14c26c6eab39adc70392bd48029add6be0e275642ba45d546370187

                            SHA512

                            9f1b5019c858b641bfb416b6ac818be7b0d473d47f1dce72032a58451e047afa245648ac695876d05a1d59bf8ca19e99a760919e1a6493d459eaf40222fad3af

                          • C:\Users\Admin\AppData\Local\Temp\7zO880A5287\HavocV2.exe

                            Filesize

                            395KB

                            MD5

                            bbd057262f45309b69aac1969de8905d

                            SHA1

                            be351afb488c78f984213d8b8fceb0792c00414a

                            SHA256

                            d223ace00adcf9996234b0e5f85b14ca273ead2c01672f7abc8469cfeacf1408

                            SHA512

                            caf0791490f568c2ac5b2242a638a8ff557916d390470b5e04acd6c3bd49a3a69be3ae015a2eb4f10624f8cbd54b99c539011da820ef949ad17b1db88e46b12d

                          • C:\Users\Admin\AppData\Local\Temp\7zO880A5287\HavocV2.exe:Zone.Identifier

                            Filesize

                            587B

                            MD5

                            98317c7fbec951c6120a05ecc467d7fb

                            SHA1

                            c20839d80aae478fa965bf68e69e08693f93cf6e

                            SHA256

                            2a52e7e1950b5ac37a32615a2d4ca3a4e4ce06bf61963172de2c2dd9d453a3bd

                            SHA512

                            2c1e551c591079cd11ab95d1f1aa7e81331373d6e96757a46c10d1fb7964ef18b2ecf5d592e5b6d4b9bbbe9c97c7b1e926b6b26fe7c1a0c9adb4d30e2925bf73

                          • C:\Users\Admin\Downloads\Havoc-Executor.rar

                            Filesize

                            16.8MB

                            MD5

                            f92596f16b2227ca7b19b8fcfc146763

                            SHA1

                            673eb42df68aec2de4558120785d4b45a7fcbe0f

                            SHA256

                            16ab548b51418dc856d375ca306d50fe04ba25df2fb01fdf31057f6fd72f5348

                            SHA512

                            668b9ddbdddccf6876ceb6e4294e0b360534ec5bee12881020e9842ee6e19d1f5554c4ca72a0a2335a71c9ab403891c5076c3f9a8ca5140d699eef5a530bee8e

                          • C:\Users\Admin\Downloads\Havoc-Executor.rar:Zone.Identifier

                            Filesize

                            26B

                            MD5

                            fbccf14d504b7b2dbcb5a5bda75bd93b

                            SHA1

                            d59fc84cdd5217c6cf74785703655f78da6b582b

                            SHA256

                            eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                            SHA512

                            aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                          • memory/3052-106-0x00000201479E0000-0x0000020147A48000-memory.dmp

                            Filesize

                            416KB

                          • memory/3052-110-0x00007FFF5AFE0000-0x00007FFF5BAA2000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/3052-108-0x0000020147F60000-0x0000020147F70000-memory.dmp

                            Filesize

                            64KB

                          • memory/3052-107-0x00007FFF5AFE0000-0x00007FFF5BAA2000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5296-140-0x00000170B72F0000-0x00000170B7300000-memory.dmp

                            Filesize

                            64KB

                          • memory/5296-150-0x00007FFF5A820000-0x00007FFF5B2E2000-memory.dmp

                            Filesize

                            10.8MB

                          • memory/5296-139-0x00007FFF5A820000-0x00007FFF5B2E2000-memory.dmp

                            Filesize

                            10.8MB