Analysis
-
max time kernel
163s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-04-2024 23:08
Static task
static1
URLScan task
urlscan1
General
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1234227911570231390/0z3FMS1OCOm4Dimw1zroCZEdttv5BdfkYDJmjaCIZnKZ5CxWh2wDpajd40DrN9mMEQHM
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/4756-39-0x00000144CA310000-0x00000144CA350000-memory.dmp family_umbral behavioral1/files/0x00040000000163e4-36.dat family_umbral -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KrampusUI.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KrampusUI.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation KrampusUI.exe -
Executes dropped EXE 9 IoCs
pid Process 4636 KrampusUI.exe 3316 Update.exe 4756 2-step.exe 1764 KrampusUI.exe 2952 Update.exe 2316 2-step.exe 5000 KrampusUI.exe 4756 Update.exe 3056 2-step.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.52\Critical Error_4BetaFix\KrampusUI.exe msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 2492 7zFM.exe Token: 35 2492 7zFM.exe Token: SeSecurityPrivilege 2492 7zFM.exe Token: SeDebugPrivilege 4756 2-step.exe Token: SeIncreaseQuotaPrivilege 5000 wmic.exe Token: SeSecurityPrivilege 5000 wmic.exe Token: SeTakeOwnershipPrivilege 5000 wmic.exe Token: SeLoadDriverPrivilege 5000 wmic.exe Token: SeSystemProfilePrivilege 5000 wmic.exe Token: SeSystemtimePrivilege 5000 wmic.exe Token: SeProfSingleProcessPrivilege 5000 wmic.exe Token: SeIncBasePriorityPrivilege 5000 wmic.exe Token: SeCreatePagefilePrivilege 5000 wmic.exe Token: SeBackupPrivilege 5000 wmic.exe Token: SeRestorePrivilege 5000 wmic.exe Token: SeShutdownPrivilege 5000 wmic.exe Token: SeDebugPrivilege 5000 wmic.exe Token: SeSystemEnvironmentPrivilege 5000 wmic.exe Token: SeRemoteShutdownPrivilege 5000 wmic.exe Token: SeUndockPrivilege 5000 wmic.exe Token: SeManageVolumePrivilege 5000 wmic.exe Token: 33 5000 wmic.exe Token: 34 5000 wmic.exe Token: 35 5000 wmic.exe Token: 36 5000 wmic.exe Token: SeIncreaseQuotaPrivilege 5000 wmic.exe Token: SeSecurityPrivilege 5000 wmic.exe Token: SeTakeOwnershipPrivilege 5000 wmic.exe Token: SeLoadDriverPrivilege 5000 wmic.exe Token: SeSystemProfilePrivilege 5000 wmic.exe Token: SeSystemtimePrivilege 5000 wmic.exe Token: SeProfSingleProcessPrivilege 5000 wmic.exe Token: SeIncBasePriorityPrivilege 5000 wmic.exe Token: SeCreatePagefilePrivilege 5000 wmic.exe Token: SeBackupPrivilege 5000 wmic.exe Token: SeRestorePrivilege 5000 wmic.exe Token: SeShutdownPrivilege 5000 wmic.exe Token: SeDebugPrivilege 5000 wmic.exe Token: SeSystemEnvironmentPrivilege 5000 wmic.exe Token: SeRemoteShutdownPrivilege 5000 wmic.exe Token: SeUndockPrivilege 5000 wmic.exe Token: SeManageVolumePrivilege 5000 wmic.exe Token: 33 5000 wmic.exe Token: 34 5000 wmic.exe Token: 35 5000 wmic.exe Token: 36 5000 wmic.exe Token: SeSecurityPrivilege 2492 7zFM.exe Token: SeDebugPrivilege 2316 2-step.exe Token: SeIncreaseQuotaPrivilege 1372 wmic.exe Token: SeSecurityPrivilege 1372 wmic.exe Token: SeTakeOwnershipPrivilege 1372 wmic.exe Token: SeLoadDriverPrivilege 1372 wmic.exe Token: SeSystemProfilePrivilege 1372 wmic.exe Token: SeSystemtimePrivilege 1372 wmic.exe Token: SeProfSingleProcessPrivilege 1372 wmic.exe Token: SeIncBasePriorityPrivilege 1372 wmic.exe Token: SeCreatePagefilePrivilege 1372 wmic.exe Token: SeBackupPrivilege 1372 wmic.exe Token: SeRestorePrivilege 1372 wmic.exe Token: SeShutdownPrivilege 1372 wmic.exe Token: SeDebugPrivilege 1372 wmic.exe Token: SeSystemEnvironmentPrivilege 1372 wmic.exe Token: SeRemoteShutdownPrivilege 1372 wmic.exe Token: SeUndockPrivilege 1372 wmic.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe 2492 7zFM.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2492 wrote to memory of 4636 2492 7zFM.exe 119 PID 2492 wrote to memory of 4636 2492 7zFM.exe 119 PID 4636 wrote to memory of 3316 4636 KrampusUI.exe 120 PID 4636 wrote to memory of 3316 4636 KrampusUI.exe 120 PID 4636 wrote to memory of 4756 4636 KrampusUI.exe 121 PID 4636 wrote to memory of 4756 4636 KrampusUI.exe 121 PID 4756 wrote to memory of 5000 4756 2-step.exe 123 PID 4756 wrote to memory of 5000 4756 2-step.exe 123 PID 2492 wrote to memory of 1764 2492 7zFM.exe 125 PID 2492 wrote to memory of 1764 2492 7zFM.exe 125 PID 1764 wrote to memory of 2952 1764 KrampusUI.exe 126 PID 1764 wrote to memory of 2952 1764 KrampusUI.exe 126 PID 1764 wrote to memory of 2316 1764 KrampusUI.exe 127 PID 1764 wrote to memory of 2316 1764 KrampusUI.exe 127 PID 2316 wrote to memory of 1372 2316 2-step.exe 128 PID 2316 wrote to memory of 1372 2316 2-step.exe 128 PID 2492 wrote to memory of 5000 2492 7zFM.exe 130 PID 2492 wrote to memory of 5000 2492 7zFM.exe 130 PID 5000 wrote to memory of 4756 5000 KrampusUI.exe 131 PID 5000 wrote to memory of 4756 5000 KrampusUI.exe 131 PID 5000 wrote to memory of 3056 5000 KrampusUI.exe 132 PID 5000 wrote to memory of 3056 5000 KrampusUI.exe 132 PID 3056 wrote to memory of 4344 3056 2-step.exe 133 PID 3056 wrote to memory of 4344 3056 2-step.exe 133
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://download.oxy.st/d/wXOh/2/b18d9bd17d358652a7abc06ed4c4f63f1⤵PID:3232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4588 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:1548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=5720 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:3452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5872 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=3644 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:1040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5540 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:3732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=3712 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:3052
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5308 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3480
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=6224 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:1468
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=6180 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:3840
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --mojo-platform-channel-handle=5560 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:3700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=27 --mojo-platform-channel-handle=5704 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:4048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6412 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:4404
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=5560 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:2900
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=30 --mojo-platform-channel-handle=6544 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:11⤵PID:3412
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6796 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵
- Drops file in Program Files directory
PID:2132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=7200 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:3424
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Critical Error_4Beta.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7zOCB940149\KrampusUI.exe"C:\Users\Admin\AppData\Local\Temp\7zOCB940149\KrampusUI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵
- Executes dropped EXE
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\2-step.exe"C:\Users\Admin\AppData\Local\Temp\2-step.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOCB95F789\KrampusUI.exe"C:\Users\Admin\AppData\Local\Temp\7zOCB95F789\KrampusUI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵
- Executes dropped EXE
PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\2-step.exe"C:\Users\Admin\AppData\Local\Temp\2-step.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zOCB9908C9\KrampusUI.exe"C:\Users\Admin\AppData\Local\Temp\7zOCB9908C9\KrampusUI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\Update.exe"C:\Users\Admin\AppData\Local\Temp\Update.exe"3⤵
- Executes dropped EXE
PID:4756
-
-
C:\Users\Admin\AppData\Local\Temp\2-step.exe"C:\Users\Admin\AppData\Local\Temp\2-step.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:4344
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58094b248fe3231e48995c2be32aeb08c
SHA12fe06e000ebec919bf982d033c5d1219c1f916b6
SHA256136c30d964f4abbb5279bdc86d0e00578333782f15f05f0d2d050730dcb7a9bc
SHA512bf27a3822008796370e2c506c910a40992b9240606ea1bc19f683b2fee86b81897660ac0cf8e746ca093dae9e408949e2e9002ded75678a69f020d3b0452801f
-
Filesize
654B
MD52ff39f6c7249774be85fd60a8f9a245e
SHA1684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA5121d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1
-
Filesize
871B
MD5386677f585908a33791517dfc2317f88
SHA12e6853b4560a9ac8a74cdd5c3124a777bc0d874e
SHA2567caf8779608c167ab6fa570df00c973aff6dee850bb63439770889a68c7cdae0
SHA512876d2269e25a4b2754bdf2c7e3c410050f885d7e6bd8abce41c5fc74ae1f8c549b2266dd1588c750f614063f36c8a8e5008cea610505897d04e4ef5c3adc52d9
-
Filesize
231KB
MD502c626b54e983d7723706eb9328f41a5
SHA1affb6e208919439418f07bcc1991c700b063b33f
SHA256209ca4d12ae3133eb80bc7e5a8fb67a39ed9bb88fb5f6137badddd54eed0e62a
SHA5123d30ccfeae87234099398a1b8050221d81a128ed79a9a183f5fb763b1991af56e27e33f3844ad56d277cbd4f0a8655d9842ea0f563a2aaabff597efea016da60
-
Filesize
323KB
MD53b7d0635ec7df3d5ff0dc1e856889aa1
SHA1cdf39ae3484d2522f84e8a6a1920f50d6ad3216e
SHA2565b5dfaa069eaca07dc4a0a4276edbc2c3418d5450addc7c16ca70cead9479131
SHA51234bc4698b3675c06d30597ce578ce92fcf8aa65281d7563121355666f03f788be6c638b843af251d5a340a89c47ffcf573cdf02b450669cec051c85fb8924aaa
-
Filesize
454KB
MD5cc70b6409bf138ea8196b2ac27c7263e
SHA16eef6535e01c225240faf18f5718a7ccfff5dc78
SHA2568021b1c265f5863f79cb7cd1789545d8ed38d5a1b75fe235fd86ea0d545e0ac4
SHA512763160a911aa21128772ed3685768c8995b7d94ea27d442b127aba6b4b7efdfa2ea1eadfe4f107cd0af769600fa463922332b2f754268bdb44b20ffde9e6d308