Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 10:06
Behavioral task
behavioral1
Sample
Umbral.exe
Resource
win7-20240220-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Umbral.exe
-
Size
229KB
-
MD5
ec8787725819a1eaa6c2acda5cde4e0c
-
SHA1
011cbaffb9a292b13be1fcfcac3e8aea5a680005
-
SHA256
490d63d3581ea7e8c895731ece8885d4059918829937c709e330f57375a309bd
-
SHA512
df2811f75d40ec7c554ecc3763764c07a343503b18a65794efa00f17c358169048eeb0f52341eeff06a5342c10b464ea31958afef903bf16bb7d39149e54685c
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4R7vh0ad1+O7mEl5QG8b8e1ms4i:noZtL+EP8R7vh0ad1+O7mEl5QL/B
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral2/memory/4584-0-0x0000020C90320000-0x0000020C90360000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4584 Umbral.exe Token: SeIncreaseQuotaPrivilege 2152 wmic.exe Token: SeSecurityPrivilege 2152 wmic.exe Token: SeTakeOwnershipPrivilege 2152 wmic.exe Token: SeLoadDriverPrivilege 2152 wmic.exe Token: SeSystemProfilePrivilege 2152 wmic.exe Token: SeSystemtimePrivilege 2152 wmic.exe Token: SeProfSingleProcessPrivilege 2152 wmic.exe Token: SeIncBasePriorityPrivilege 2152 wmic.exe Token: SeCreatePagefilePrivilege 2152 wmic.exe Token: SeBackupPrivilege 2152 wmic.exe Token: SeRestorePrivilege 2152 wmic.exe Token: SeShutdownPrivilege 2152 wmic.exe Token: SeDebugPrivilege 2152 wmic.exe Token: SeSystemEnvironmentPrivilege 2152 wmic.exe Token: SeRemoteShutdownPrivilege 2152 wmic.exe Token: SeUndockPrivilege 2152 wmic.exe Token: SeManageVolumePrivilege 2152 wmic.exe Token: 33 2152 wmic.exe Token: 34 2152 wmic.exe Token: 35 2152 wmic.exe Token: 36 2152 wmic.exe Token: SeIncreaseQuotaPrivilege 2152 wmic.exe Token: SeSecurityPrivilege 2152 wmic.exe Token: SeTakeOwnershipPrivilege 2152 wmic.exe Token: SeLoadDriverPrivilege 2152 wmic.exe Token: SeSystemProfilePrivilege 2152 wmic.exe Token: SeSystemtimePrivilege 2152 wmic.exe Token: SeProfSingleProcessPrivilege 2152 wmic.exe Token: SeIncBasePriorityPrivilege 2152 wmic.exe Token: SeCreatePagefilePrivilege 2152 wmic.exe Token: SeBackupPrivilege 2152 wmic.exe Token: SeRestorePrivilege 2152 wmic.exe Token: SeShutdownPrivilege 2152 wmic.exe Token: SeDebugPrivilege 2152 wmic.exe Token: SeSystemEnvironmentPrivilege 2152 wmic.exe Token: SeRemoteShutdownPrivilege 2152 wmic.exe Token: SeUndockPrivilege 2152 wmic.exe Token: SeManageVolumePrivilege 2152 wmic.exe Token: 33 2152 wmic.exe Token: 34 2152 wmic.exe Token: 35 2152 wmic.exe Token: 36 2152 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4584 wrote to memory of 2152 4584 Umbral.exe 91 PID 4584 wrote to memory of 2152 4584 Umbral.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2152
-