Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-02-2024 19:29

General

  • Target

    Netflix_Checker_50K__CPM.rar

  • Size

    8.2MB

  • MD5

    1e13454bdfc4f54a02339c99279b6b2e

  • SHA1

    8d025bb5e2990aa898d1ce299e68b2ca86ec74b0

  • SHA256

    482c7fa477b50ba1f6f6254060c2e472a23c3c18da7f1bab3f19691fc3dca563

  • SHA512

    c6f2bfc11e0712d6333ac8034555df7d42342bb1a7ffd9d6728fe73cd7a4a5f1636b14231630eee01b280f85b7f01d64852b3f71d68c056d28829b6322062159

  • SSDEEP

    196608:+0hW8xil8grmCHD7J0FzEuPoBsPVSN6ql:+0887gRnJ8zEoo2PV06ql

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1153056107867164752/tRuN1HzDWrxnDeJOXWa-NtAfRVdka8UNdyoIo4-qrYXI_C1XFMggkrLEFyTkoagsN9jt

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Netflix_Checker_50K__CPM.rar
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Netflix_Checker_50K__CPM.rar"
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO81EB38F7\pass 1122.txt
        3⤵
          PID:1836
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4432
      • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe
        "C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:440
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3744
      • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe
        "C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4136
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3496
      • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe
        "C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe"
        1⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:788
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          2⤵
            PID:456

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Netflix Checker.exe.log

          Filesize

          1KB

          MD5

          8094b248fe3231e48995c2be32aeb08c

          SHA1

          2fe06e000ebec919bf982d033c5d1219c1f916b6

          SHA256

          136c30d964f4abbb5279bdc86d0e00578333782f15f05f0d2d050730dcb7a9bc

          SHA512

          bf27a3822008796370e2c506c910a40992b9240606ea1bc19f683b2fee86b81897660ac0cf8e746ca093dae9e408949e2e9002ded75678a69f020d3b0452801f

        • C:\Users\Admin\AppData\Local\Temp\7zO81EB38F7\pass 1122.txt

          Filesize

          9B

          MD5

          50da9795513edb709f05cc3dd45bb875

          SHA1

          28b8ffc4bffa76f728391d21e72d73de359b706b

          SHA256

          80aad06e823c524b80b779f2ad1722508460609de79319ec1e8f87a72fd2085c

          SHA512

          6d4ddfd185f093a91e93c878283cffc3b1603d43dad57b896af03b4025f42ebcaa908b02070051e275073416076c518c4f562b589da8ca8c45747b003f73942e

        • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe

          Filesize

          242KB

          MD5

          011f4b831fa140d845aa76780370888d

          SHA1

          3624e855721b4224cd6066fff0f17e9d331d8bf3

          SHA256

          9bfd7a58f2a94cc5fc4d10e7fdbe7e09763c3e0f17611c3e573b76542e93dc7c

          SHA512

          0083abb2e649ecac73027adac87b359ff4f356712990e9f9acbc6834ba9cc474cd7866ade8d029147aa1b6e858a6fab9b566b05f4604b2cb9126f77fef8be006

        • memory/440-71-0x00007FFF29600000-0x00007FFF2A0C1000-memory.dmp

          Filesize

          10.8MB

        • memory/440-69-0x000002936A9A0000-0x000002936A9B0000-memory.dmp

          Filesize

          64KB

        • memory/440-68-0x00007FFF29600000-0x00007FFF2A0C1000-memory.dmp

          Filesize

          10.8MB

        • memory/440-67-0x00000293684B0000-0x00000293684F2000-memory.dmp

          Filesize

          264KB

        • memory/788-78-0x00007FFF29600000-0x00007FFF2A0C1000-memory.dmp

          Filesize

          10.8MB

        • memory/788-79-0x0000017674DF0000-0x0000017674E00000-memory.dmp

          Filesize

          64KB

        • memory/788-80-0x00007FFF29600000-0x00007FFF2A0C1000-memory.dmp

          Filesize

          10.8MB

        • memory/4136-74-0x00007FFF29600000-0x00007FFF2A0C1000-memory.dmp

          Filesize

          10.8MB

        • memory/4136-75-0x00000258534D0000-0x00000258534E0000-memory.dmp

          Filesize

          64KB

        • memory/4136-76-0x00007FFF29600000-0x00007FFF2A0C1000-memory.dmp

          Filesize

          10.8MB