Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
17-03-2024 16:20
General
-
Target
flameware free spoof.exe
-
Size
445KB
-
MD5
4bbcdd97740fb152109f809a6625e0bb
-
SHA1
69993fd2dc46acb60d4f95e553ab7bd66096305d
-
SHA256
3156fea939c2b71683a306896ad4185b9c3afb57930fb17d9207ff78161e7dfd
-
SHA512
5246b088157b6e3a1e61fb90c0cef054aafe11708ab12a9b35cf1ba5875080b2d037342637333eb57fc6cc41a918af1674bb91343c3c4a62ad2a4e03b0aa6417
-
SSDEEP
6144:eSncRlyToy9yZ/koAvzDIjjL+dLCULOoepRXgtlAiLcW7tBWJ+q:z48ToYyZMoAvzDIjjSdBLyVW7tQJ3
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000002321d-5.dat family_umbral behavioral1/memory/2280-20-0x0000020304A00000-0x0000020304A4A000-memory.dmp family_umbral -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation flameware free spoof.exe -
Executes dropped EXE 2 IoCs
pid Process 2280 BIG BLACK BOOTY BITCHES.EXE 64 EXPOSINGCLOWNS.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3656 64 WerFault.exe 91 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2280 2824 flameware free spoof.exe 90 PID 2824 wrote to memory of 2280 2824 flameware free spoof.exe 90 PID 2824 wrote to memory of 64 2824 flameware free spoof.exe 91 PID 2824 wrote to memory of 64 2824 flameware free spoof.exe 91 PID 2824 wrote to memory of 64 2824 flameware free spoof.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\flameware free spoof.exe"C:\Users\Admin\AppData\Local\Temp\flameware free spoof.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\BIG BLACK BOOTY BITCHES.EXE"C:\Users\Admin\AppData\Local\Temp\BIG BLACK BOOTY BITCHES.EXE"2⤵
- Executes dropped EXE
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\EXPOSINGCLOWNS.EXE"C:\Users\Admin\AppData\Local\Temp\EXPOSINGCLOWNS.EXE"2⤵
- Executes dropped EXE
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 10523⤵
- Program crash
PID:3656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 64 -ip 641⤵PID:2836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272KB
MD596c600f16edb930d23703cbd7ec512f1
SHA135677f59c0f8f652a9224efda1784700da43c3bb
SHA25610577cf4d3577ce6c7a897b6130904deac8302dabdb7768d9ef7caed998ba0b6
SHA512ab92334dcd24269ecb9e68320ee90ff7827418ab1b21f8f8ba838a460c30860464a1df1eaad8a6f6fdbc1877ab8bc9e3bfcc0d4ae35bb205d255e6295dbb1eb3
-
Filesize
119KB
MD535c72e33f368be9330f73a6dacc877af
SHA112982be9f287e3100215116e3d025b6072970256
SHA2562b5159a33b3940e4241ec7566e01f34cd41efdf5adc628b05f6ec0aad592fece
SHA512b1ff93d21cdb681eea0a8e46f927b50e85c765578e47f6e2976212a9c363fffff9276ff07889a443145b6b7074cf003db45204afd372b36d910edf56c0264134