Analysis

  • max time kernel
    1561s
  • max time network
    1564s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15/03/2024, 21:43

General

  • Target

    PeerDistAD.exe

  • Size

    229KB

  • MD5

    afa8bb7e6708d4b5c056079f642b65f9

  • SHA1

    3cadcd7a2da0bc26fd7912f46bdc692e51752913

  • SHA256

    9041042642f5c0b67443490fc595aaaa1858c3a8582602969f1af568cad398e9

  • SHA512

    46392d04c3827a9f1602685bae2b10a69306839ce3af5b51889a70925e48654e0b8793ae4f68a4ce94f7c7dc71d0d69f0437583417b32cef9619024294351ed4

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4Z/kJ2U7X8+toGnnGr8+cI8e1mAi:noZtL+EP8Z/kJ2U7X8+toGnnGr8S6

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PeerDistAD.exe
    "C:\Users\Admin\AppData\Local\Temp\PeerDistAD.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:280

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2212-0-0x0000000000B90000-0x0000000000BD0000-memory.dmp

          Filesize

          256KB

        • memory/2212-1-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

          Filesize

          9.9MB

        • memory/2212-2-0x000000001B360000-0x000000001B3E0000-memory.dmp

          Filesize

          512KB

        • memory/2212-3-0x000007FEF5F20000-0x000007FEF690C000-memory.dmp

          Filesize

          9.9MB