Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-03-2024 14:35
Behavioral task
behavioral1
Sample
celex.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
celex.exe
-
Size
227KB
-
MD5
f16dec0bdfdb9ae71b1b410c6ed815ec
-
SHA1
10077d4bbc449011fdebc06810fc2196873eaf86
-
SHA256
d94fca1806e2fd56a8d56dd4599ba69f39633a0247b78922773da7504d51cf19
-
SHA512
3b9d0b195eb8348fb44739d9a703228113c9810f50e9d145eaac0e8642dbac9435b593be7f982f4b0c041b6bc635b2b14da5fcba577004e3e25f77a2b7ad071e
-
SSDEEP
6144:eloZM+rIkd8g+EtXHkv/iD4oAWfecjfUQ1gevPec5/b8e1mPi:IoZtL+EP8oAWfecjfUQ1gevPecNR
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/2928-0-0x0000000001360000-0x00000000013A0000-memory.dmp family_umbral behavioral1/memory/2928-2-0x000000001B000000-0x000000001B080000-memory.dmp family_umbral -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2928 celex.exe Token: SeIncreaseQuotaPrivilege 2292 wmic.exe Token: SeSecurityPrivilege 2292 wmic.exe Token: SeTakeOwnershipPrivilege 2292 wmic.exe Token: SeLoadDriverPrivilege 2292 wmic.exe Token: SeSystemProfilePrivilege 2292 wmic.exe Token: SeSystemtimePrivilege 2292 wmic.exe Token: SeProfSingleProcessPrivilege 2292 wmic.exe Token: SeIncBasePriorityPrivilege 2292 wmic.exe Token: SeCreatePagefilePrivilege 2292 wmic.exe Token: SeBackupPrivilege 2292 wmic.exe Token: SeRestorePrivilege 2292 wmic.exe Token: SeShutdownPrivilege 2292 wmic.exe Token: SeDebugPrivilege 2292 wmic.exe Token: SeSystemEnvironmentPrivilege 2292 wmic.exe Token: SeRemoteShutdownPrivilege 2292 wmic.exe Token: SeUndockPrivilege 2292 wmic.exe Token: SeManageVolumePrivilege 2292 wmic.exe Token: 33 2292 wmic.exe Token: 34 2292 wmic.exe Token: 35 2292 wmic.exe Token: SeIncreaseQuotaPrivilege 2292 wmic.exe Token: SeSecurityPrivilege 2292 wmic.exe Token: SeTakeOwnershipPrivilege 2292 wmic.exe Token: SeLoadDriverPrivilege 2292 wmic.exe Token: SeSystemProfilePrivilege 2292 wmic.exe Token: SeSystemtimePrivilege 2292 wmic.exe Token: SeProfSingleProcessPrivilege 2292 wmic.exe Token: SeIncBasePriorityPrivilege 2292 wmic.exe Token: SeCreatePagefilePrivilege 2292 wmic.exe Token: SeBackupPrivilege 2292 wmic.exe Token: SeRestorePrivilege 2292 wmic.exe Token: SeShutdownPrivilege 2292 wmic.exe Token: SeDebugPrivilege 2292 wmic.exe Token: SeSystemEnvironmentPrivilege 2292 wmic.exe Token: SeRemoteShutdownPrivilege 2292 wmic.exe Token: SeUndockPrivilege 2292 wmic.exe Token: SeManageVolumePrivilege 2292 wmic.exe Token: 33 2292 wmic.exe Token: 34 2292 wmic.exe Token: 35 2292 wmic.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2292 2928 celex.exe 28 PID 2928 wrote to memory of 2292 2928 celex.exe 28 PID 2928 wrote to memory of 2292 2928 celex.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\celex.exe"C:\Users\Admin\AppData\Local\Temp\celex.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2292
-