Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-02-2024 13:38
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20240221-en
General
-
Target
injector.exe
-
Size
231KB
-
MD5
0a40e097ff34f2786e6a1b1c2695db2d
-
SHA1
7701f374e627f5624ee7b792c777d2b59b41ac20
-
SHA256
a9e16fdb1ad53a73784a03803410b238e2de590eb1f7a1d6e4dfa0354ef99ca0
-
SHA512
3ed97fbbd49460b582c51059b7e96535a951820179e89492f16668d176c8bb33ebaf8f4e056e5e909fcda74167dfa71cd8f83db840b10fb084019ae675982c47
-
SSDEEP
6144:xloZMArIkd8g+EtXHkv/iD44gTVBPUonRWvRsY94Fb8e1mFrQi:DoZHL+EP84gTVBPUonRWvRsY9sOJ
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2120-0-0x0000000000C60000-0x0000000000CA0000-memory.dmp family_umbral -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts injector.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 6 discord.com 7 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2304 wmic.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2624 powershell.exe 2448 powershell.exe 2968 powershell.exe 672 powershell.exe 2784 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2120 injector.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2968 powershell.exe Token: SeDebugPrivilege 672 powershell.exe Token: SeIncreaseQuotaPrivilege 2508 wmic.exe Token: SeSecurityPrivilege 2508 wmic.exe Token: SeTakeOwnershipPrivilege 2508 wmic.exe Token: SeLoadDriverPrivilege 2508 wmic.exe Token: SeSystemProfilePrivilege 2508 wmic.exe Token: SeSystemtimePrivilege 2508 wmic.exe Token: SeProfSingleProcessPrivilege 2508 wmic.exe Token: SeIncBasePriorityPrivilege 2508 wmic.exe Token: SeCreatePagefilePrivilege 2508 wmic.exe Token: SeBackupPrivilege 2508 wmic.exe Token: SeRestorePrivilege 2508 wmic.exe Token: SeShutdownPrivilege 2508 wmic.exe Token: SeDebugPrivilege 2508 wmic.exe Token: SeSystemEnvironmentPrivilege 2508 wmic.exe Token: SeRemoteShutdownPrivilege 2508 wmic.exe Token: SeUndockPrivilege 2508 wmic.exe Token: SeManageVolumePrivilege 2508 wmic.exe Token: 33 2508 wmic.exe Token: 34 2508 wmic.exe Token: 35 2508 wmic.exe Token: SeIncreaseQuotaPrivilege 2508 wmic.exe Token: SeSecurityPrivilege 2508 wmic.exe Token: SeTakeOwnershipPrivilege 2508 wmic.exe Token: SeLoadDriverPrivilege 2508 wmic.exe Token: SeSystemProfilePrivilege 2508 wmic.exe Token: SeSystemtimePrivilege 2508 wmic.exe Token: SeProfSingleProcessPrivilege 2508 wmic.exe Token: SeIncBasePriorityPrivilege 2508 wmic.exe Token: SeCreatePagefilePrivilege 2508 wmic.exe Token: SeBackupPrivilege 2508 wmic.exe Token: SeRestorePrivilege 2508 wmic.exe Token: SeShutdownPrivilege 2508 wmic.exe Token: SeDebugPrivilege 2508 wmic.exe Token: SeSystemEnvironmentPrivilege 2508 wmic.exe Token: SeRemoteShutdownPrivilege 2508 wmic.exe Token: SeUndockPrivilege 2508 wmic.exe Token: SeManageVolumePrivilege 2508 wmic.exe Token: 33 2508 wmic.exe Token: 34 2508 wmic.exe Token: 35 2508 wmic.exe Token: SeIncreaseQuotaPrivilege 1408 wmic.exe Token: SeSecurityPrivilege 1408 wmic.exe Token: SeTakeOwnershipPrivilege 1408 wmic.exe Token: SeLoadDriverPrivilege 1408 wmic.exe Token: SeSystemProfilePrivilege 1408 wmic.exe Token: SeSystemtimePrivilege 1408 wmic.exe Token: SeProfSingleProcessPrivilege 1408 wmic.exe Token: SeIncBasePriorityPrivilege 1408 wmic.exe Token: SeCreatePagefilePrivilege 1408 wmic.exe Token: SeBackupPrivilege 1408 wmic.exe Token: SeRestorePrivilege 1408 wmic.exe Token: SeShutdownPrivilege 1408 wmic.exe Token: SeDebugPrivilege 1408 wmic.exe Token: SeSystemEnvironmentPrivilege 1408 wmic.exe Token: SeRemoteShutdownPrivilege 1408 wmic.exe Token: SeUndockPrivilege 1408 wmic.exe Token: SeManageVolumePrivilege 1408 wmic.exe Token: 33 1408 wmic.exe Token: 34 1408 wmic.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2624 2120 injector.exe 28 PID 2120 wrote to memory of 2624 2120 injector.exe 28 PID 2120 wrote to memory of 2624 2120 injector.exe 28 PID 2120 wrote to memory of 2448 2120 injector.exe 31 PID 2120 wrote to memory of 2448 2120 injector.exe 31 PID 2120 wrote to memory of 2448 2120 injector.exe 31 PID 2120 wrote to memory of 2968 2120 injector.exe 32 PID 2120 wrote to memory of 2968 2120 injector.exe 32 PID 2120 wrote to memory of 2968 2120 injector.exe 32 PID 2120 wrote to memory of 672 2120 injector.exe 35 PID 2120 wrote to memory of 672 2120 injector.exe 35 PID 2120 wrote to memory of 672 2120 injector.exe 35 PID 2120 wrote to memory of 2508 2120 injector.exe 36 PID 2120 wrote to memory of 2508 2120 injector.exe 36 PID 2120 wrote to memory of 2508 2120 injector.exe 36 PID 2120 wrote to memory of 1408 2120 injector.exe 40 PID 2120 wrote to memory of 1408 2120 injector.exe 40 PID 2120 wrote to memory of 1408 2120 injector.exe 40 PID 2120 wrote to memory of 972 2120 injector.exe 42 PID 2120 wrote to memory of 972 2120 injector.exe 42 PID 2120 wrote to memory of 972 2120 injector.exe 42 PID 2120 wrote to memory of 2784 2120 injector.exe 44 PID 2120 wrote to memory of 2784 2120 injector.exe 44 PID 2120 wrote to memory of 2784 2120 injector.exe 44 PID 2120 wrote to memory of 2304 2120 injector.exe 46 PID 2120 wrote to memory of 2304 2120 injector.exe 46 PID 2120 wrote to memory of 2304 2120 injector.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\injector.exe"C:\Users\Admin\AppData\Local\Temp\injector.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\injector.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5efbb307ba6a1ea1dc5d88134c91ad8aa
SHA1a67e4e08b1c50fc2c9607e82ef6d565d3c1447fa
SHA2560a6721b9ba92af4dc896e27cf55977643b5597eeafc47c4098c3e3fb1afc3415
SHA5121793b4c855c5a204c8e98bee8af1a38607dd629053ea3659f60565c3d26a191db603807b5f792d9c1e1afb5c5c931fd1c9bac17519c0ab8ab27860272960d100