Analysis

  • max time kernel
    134s
  • max time network
    124s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    27-02-2024 19:29

General

  • Target

    Netflix_Checker_50K__CPM.rar

  • Size

    8.2MB

  • MD5

    1e13454bdfc4f54a02339c99279b6b2e

  • SHA1

    8d025bb5e2990aa898d1ce299e68b2ca86ec74b0

  • SHA256

    482c7fa477b50ba1f6f6254060c2e472a23c3c18da7f1bab3f19691fc3dca563

  • SHA512

    c6f2bfc11e0712d6333ac8034555df7d42342bb1a7ffd9d6728fe73cd7a4a5f1636b14231630eee01b280f85b7f01d64852b3f71d68c056d28829b6322062159

  • SSDEEP

    196608:+0hW8xil8grmCHD7J0FzEuPoBsPVSN6ql:+0887gRnJ8zEoo2PV06ql

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1153056107867164752/tRuN1HzDWrxnDeJOXWa-NtAfRVdka8UNdyoIo4-qrYXI_C1XFMggkrLEFyTkoagsN9jt

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Netflix_Checker_50K__CPM.rar
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Netflix_Checker_50K__CPM.rar"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:984
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:564
    • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe
      "C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:484
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
    • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe
      "C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:536
    • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe
      "C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
          PID:704

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Netflix Checker.exe.log

        Filesize

        1KB

        MD5

        02df789e3c730b309fc4d9abce5d729b

        SHA1

        4f9da0f0d4cadacfd0f68fb1f7ee73a66dcf1b4e

        SHA256

        4afabcd1723096359d90c8f32df7a6a44cd866e89d5b37c89280bfeab61d7321

        SHA512

        7ac0dd7e3a3e483d07409da793dd2b0915d4369fe41fe743acd82de9aa77b9fa7ea5cd60498034f3fa0674d93d184c9128375d8f7f0796fddecff3845fca8587

      • C:\Users\Admin\Desktop\NFC-main-master\Netflix Checker.exe

        Filesize

        242KB

        MD5

        011f4b831fa140d845aa76780370888d

        SHA1

        3624e855721b4224cd6066fff0f17e9d331d8bf3

        SHA256

        9bfd7a58f2a94cc5fc4d10e7fdbe7e09763c3e0f17611c3e573b76542e93dc7c

        SHA512

        0083abb2e649ecac73027adac87b359ff4f356712990e9f9acbc6834ba9cc474cd7866ade8d029147aa1b6e858a6fab9b566b05f4604b2cb9126f77fef8be006

      • memory/484-62-0x000002625E9A0000-0x000002625E9E2000-memory.dmp

        Filesize

        264KB

      • memory/484-63-0x00007FFDA5DE0000-0x00007FFDA68A2000-memory.dmp

        Filesize

        10.8MB

      • memory/484-64-0x0000026279000000-0x0000026279010000-memory.dmp

        Filesize

        64KB

      • memory/484-66-0x00007FFDA5DE0000-0x00007FFDA68A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2484-69-0x00007FFDA5DE0000-0x00007FFDA68A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2484-70-0x0000018E1C9C0000-0x0000018E1C9D0000-memory.dmp

        Filesize

        64KB

      • memory/2484-71-0x00007FFDA5DE0000-0x00007FFDA68A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2628-73-0x00007FFDA5DE0000-0x00007FFDA68A2000-memory.dmp

        Filesize

        10.8MB

      • memory/2628-74-0x00000265F03E0000-0x00000265F03F0000-memory.dmp

        Filesize

        64KB

      • memory/2628-75-0x00007FFDA5DE0000-0x00007FFDA68A2000-memory.dmp

        Filesize

        10.8MB