Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 18:44
Behavioral task
behavioral1
Sample
Umbral1.exe
Resource
win7-20240221-en
General
-
Target
Umbral1.exe
-
Size
231KB
-
MD5
8b87bf1f0e629ac52ed3ea11d93e2985
-
SHA1
e89c68857a7478e1fe5a0846ef637284e1603bc6
-
SHA256
0d0f238dfc7639c39bbd97db3e29bc62f5da11b5242ce594eafef6c5ebc15b30
-
SHA512
d431b338536a879bf6ea50142936a8d05b4ebc5785a53e35f28a0f393744d17d987a0d63597a13273a9f36308537c6e23c02f197447f4a72a911dda715651180
-
SSDEEP
6144:xloZM9rIkd8g+EtXHkv/iD41FRzAmB5KG/Cwhl0OGb8e1mOSi:DoZOL+EP81FRzAmB5KG/Cwhl0NN
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/1708-0-0x0000000000250000-0x0000000000290000-memory.dmp family_umbral behavioral1/memory/1708-2-0x000000001B060000-0x000000001B0E0000-memory.dmp family_umbral -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral1.exe -
Deletes itself 1 IoCs
pid Process 2284 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 discord.com 7 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1484 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1200 PING.EXE -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2644 powershell.exe 2344 powershell.exe 852 powershell.exe 2968 powershell.exe 860 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1708 Umbral1.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 852 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeIncreaseQuotaPrivilege 1548 wmic.exe Token: SeSecurityPrivilege 1548 wmic.exe Token: SeTakeOwnershipPrivilege 1548 wmic.exe Token: SeLoadDriverPrivilege 1548 wmic.exe Token: SeSystemProfilePrivilege 1548 wmic.exe Token: SeSystemtimePrivilege 1548 wmic.exe Token: SeProfSingleProcessPrivilege 1548 wmic.exe Token: SeIncBasePriorityPrivilege 1548 wmic.exe Token: SeCreatePagefilePrivilege 1548 wmic.exe Token: SeBackupPrivilege 1548 wmic.exe Token: SeRestorePrivilege 1548 wmic.exe Token: SeShutdownPrivilege 1548 wmic.exe Token: SeDebugPrivilege 1548 wmic.exe Token: SeSystemEnvironmentPrivilege 1548 wmic.exe Token: SeRemoteShutdownPrivilege 1548 wmic.exe Token: SeUndockPrivilege 1548 wmic.exe Token: SeManageVolumePrivilege 1548 wmic.exe Token: 33 1548 wmic.exe Token: 34 1548 wmic.exe Token: 35 1548 wmic.exe Token: SeIncreaseQuotaPrivilege 1548 wmic.exe Token: SeSecurityPrivilege 1548 wmic.exe Token: SeTakeOwnershipPrivilege 1548 wmic.exe Token: SeLoadDriverPrivilege 1548 wmic.exe Token: SeSystemProfilePrivilege 1548 wmic.exe Token: SeSystemtimePrivilege 1548 wmic.exe Token: SeProfSingleProcessPrivilege 1548 wmic.exe Token: SeIncBasePriorityPrivilege 1548 wmic.exe Token: SeCreatePagefilePrivilege 1548 wmic.exe Token: SeBackupPrivilege 1548 wmic.exe Token: SeRestorePrivilege 1548 wmic.exe Token: SeShutdownPrivilege 1548 wmic.exe Token: SeDebugPrivilege 1548 wmic.exe Token: SeSystemEnvironmentPrivilege 1548 wmic.exe Token: SeRemoteShutdownPrivilege 1548 wmic.exe Token: SeUndockPrivilege 1548 wmic.exe Token: SeManageVolumePrivilege 1548 wmic.exe Token: 33 1548 wmic.exe Token: 34 1548 wmic.exe Token: 35 1548 wmic.exe Token: SeIncreaseQuotaPrivilege 2524 wmic.exe Token: SeSecurityPrivilege 2524 wmic.exe Token: SeTakeOwnershipPrivilege 2524 wmic.exe Token: SeLoadDriverPrivilege 2524 wmic.exe Token: SeSystemProfilePrivilege 2524 wmic.exe Token: SeSystemtimePrivilege 2524 wmic.exe Token: SeProfSingleProcessPrivilege 2524 wmic.exe Token: SeIncBasePriorityPrivilege 2524 wmic.exe Token: SeCreatePagefilePrivilege 2524 wmic.exe Token: SeBackupPrivilege 2524 wmic.exe Token: SeRestorePrivilege 2524 wmic.exe Token: SeShutdownPrivilege 2524 wmic.exe Token: SeDebugPrivilege 2524 wmic.exe Token: SeSystemEnvironmentPrivilege 2524 wmic.exe Token: SeRemoteShutdownPrivilege 2524 wmic.exe Token: SeUndockPrivilege 2524 wmic.exe Token: SeManageVolumePrivilege 2524 wmic.exe Token: 33 2524 wmic.exe Token: 34 2524 wmic.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2616 1708 Umbral1.exe 29 PID 1708 wrote to memory of 2616 1708 Umbral1.exe 29 PID 1708 wrote to memory of 2616 1708 Umbral1.exe 29 PID 1708 wrote to memory of 2644 1708 Umbral1.exe 30 PID 1708 wrote to memory of 2644 1708 Umbral1.exe 30 PID 1708 wrote to memory of 2644 1708 Umbral1.exe 30 PID 1708 wrote to memory of 2344 1708 Umbral1.exe 32 PID 1708 wrote to memory of 2344 1708 Umbral1.exe 32 PID 1708 wrote to memory of 2344 1708 Umbral1.exe 32 PID 1708 wrote to memory of 852 1708 Umbral1.exe 34 PID 1708 wrote to memory of 852 1708 Umbral1.exe 34 PID 1708 wrote to memory of 852 1708 Umbral1.exe 34 PID 1708 wrote to memory of 2968 1708 Umbral1.exe 36 PID 1708 wrote to memory of 2968 1708 Umbral1.exe 36 PID 1708 wrote to memory of 2968 1708 Umbral1.exe 36 PID 1708 wrote to memory of 1548 1708 Umbral1.exe 38 PID 1708 wrote to memory of 1548 1708 Umbral1.exe 38 PID 1708 wrote to memory of 1548 1708 Umbral1.exe 38 PID 1708 wrote to memory of 2524 1708 Umbral1.exe 41 PID 1708 wrote to memory of 2524 1708 Umbral1.exe 41 PID 1708 wrote to memory of 2524 1708 Umbral1.exe 41 PID 1708 wrote to memory of 944 1708 Umbral1.exe 43 PID 1708 wrote to memory of 944 1708 Umbral1.exe 43 PID 1708 wrote to memory of 944 1708 Umbral1.exe 43 PID 1708 wrote to memory of 860 1708 Umbral1.exe 45 PID 1708 wrote to memory of 860 1708 Umbral1.exe 45 PID 1708 wrote to memory of 860 1708 Umbral1.exe 45 PID 1708 wrote to memory of 1484 1708 Umbral1.exe 47 PID 1708 wrote to memory of 1484 1708 Umbral1.exe 47 PID 1708 wrote to memory of 1484 1708 Umbral1.exe 47 PID 1708 wrote to memory of 2284 1708 Umbral1.exe 49 PID 1708 wrote to memory of 2284 1708 Umbral1.exe 49 PID 1708 wrote to memory of 2284 1708 Umbral1.exe 49 PID 2284 wrote to memory of 1200 2284 cmd.exe 51 PID 2284 wrote to memory of 1200 2284 cmd.exe 51 PID 2284 wrote to memory of 1200 2284 cmd.exe 51 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2616 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Umbral1.exe"C:\Users\Admin\AppData\Local\Temp\Umbral1.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral1.exe"2⤵
- Views/modifies file attributes
PID:2616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral1.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1484
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral1.exe" && pause2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\system32\PING.EXEping localhost3⤵
- Runs ping.exe
PID:1200
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5544f3ab6070683a5f9f8c4156136990f
SHA1b4108472ec9e87ad28980b0d830756b2e7f64fa2
SHA256ab836d53780741e88495a1a09f6e037a80a96053e6509d14b17d721f39115070
SHA5126598c34e9e6821ed9020be06b93c1d1391a3db332a1af2e180a7dad75233241e6ec29623cfeb69901451ab032ee5fe399a63b5c7eeabeb91e0efdb1c9e1b83fa