Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240220-en -
resource tags
arch:x64arch:x86image:win10v2004-20240220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-02-2024 16:53
General
-
Target
Umbral.exe
-
Size
229KB
-
MD5
95b54ca0a6742f2b35c4b16215a691e0
-
SHA1
81840a84816bb1fed04289470b2f7f144c830589
-
SHA256
a526a0732206548456573538c31e6f5b050c7ed8ebdf3e63e6acfaa77a766182
-
SHA512
2b4758ae67a972b7801db9d6fd1ee26ff3a3c399f03019541c06a71d49e7582b9901aa83f9d0f831c4dd6c27d18e0d1032f255f746d8c85fc011d9c59b3df526
-
SSDEEP
6144:6loZM+9EB1/SqctonEPfCqAdKq9gji8e1mu6:EoZQdSqcwvUq2kO
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/4448-0-0x00000135CB0E0000-0x00000135CB120000-memory.dmp family_umbral -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4123566616-543693798-272350410-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1360 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 4448 Umbral.exe Token: SeIncreaseQuotaPrivilege 4176 wmic.exe Token: SeSecurityPrivilege 4176 wmic.exe Token: SeTakeOwnershipPrivilege 4176 wmic.exe Token: SeLoadDriverPrivilege 4176 wmic.exe Token: SeSystemProfilePrivilege 4176 wmic.exe Token: SeSystemtimePrivilege 4176 wmic.exe Token: SeProfSingleProcessPrivilege 4176 wmic.exe Token: SeIncBasePriorityPrivilege 4176 wmic.exe Token: SeCreatePagefilePrivilege 4176 wmic.exe Token: SeBackupPrivilege 4176 wmic.exe Token: SeRestorePrivilege 4176 wmic.exe Token: SeShutdownPrivilege 4176 wmic.exe Token: SeDebugPrivilege 4176 wmic.exe Token: SeSystemEnvironmentPrivilege 4176 wmic.exe Token: SeRemoteShutdownPrivilege 4176 wmic.exe Token: SeUndockPrivilege 4176 wmic.exe Token: SeManageVolumePrivilege 4176 wmic.exe Token: 33 4176 wmic.exe Token: 34 4176 wmic.exe Token: 35 4176 wmic.exe Token: 36 4176 wmic.exe Token: SeIncreaseQuotaPrivilege 4176 wmic.exe Token: SeSecurityPrivilege 4176 wmic.exe Token: SeTakeOwnershipPrivilege 4176 wmic.exe Token: SeLoadDriverPrivilege 4176 wmic.exe Token: SeSystemProfilePrivilege 4176 wmic.exe Token: SeSystemtimePrivilege 4176 wmic.exe Token: SeProfSingleProcessPrivilege 4176 wmic.exe Token: SeIncBasePriorityPrivilege 4176 wmic.exe Token: SeCreatePagefilePrivilege 4176 wmic.exe Token: SeBackupPrivilege 4176 wmic.exe Token: SeRestorePrivilege 4176 wmic.exe Token: SeShutdownPrivilege 4176 wmic.exe Token: SeDebugPrivilege 4176 wmic.exe Token: SeSystemEnvironmentPrivilege 4176 wmic.exe Token: SeRemoteShutdownPrivilege 4176 wmic.exe Token: SeUndockPrivilege 4176 wmic.exe Token: SeManageVolumePrivilege 4176 wmic.exe Token: 33 4176 wmic.exe Token: 34 4176 wmic.exe Token: 35 4176 wmic.exe Token: 36 4176 wmic.exe Token: SeDebugPrivilege 1360 taskmgr.exe Token: SeSystemProfilePrivilege 1360 taskmgr.exe Token: SeCreateGlobalPrivilege 1360 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe 1360 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4176 4448 Umbral.exe 86 PID 4448 wrote to memory of 4176 4448 Umbral.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1360
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4472
-
C:\Windows\System32\x0rhha.exe"C:\Windows\System32\x0rhha.exe"1⤵PID:4760