Analysis
-
max time kernel
1565s -
max time network
1566s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
07-06-2024 16:37
Behavioral task
behavioral1
Sample
TOKEN BOT.exe
Resource
win7-20240220-en
General
-
Target
TOKEN BOT.exe
-
Size
231KB
-
MD5
6237b7bfdeef6aa9095852ac74ab5e6e
-
SHA1
deaf71a3709b52817cdfe5aec902507c8b89b36b
-
SHA256
b4aff6f798705f34a3edf6b528a71aa2dbbeb6d71299799eb1042a09822af2f6
-
SHA512
263e769b21fc67f6ccb3c3135b66635cfb12af503b3d90bcc304a1d0b3f7a2524df630c2f3d2dbb968eb5296569e77a49aa66e0627eaea7d5df89c761454541d
-
SSDEEP
6144:RloZMQrIkd8g+EtXHkv/iD4vBLU69VewbGkFZw1fUtLJU8e1mci:joZ3L+EP8vBLU69VewbGkFZwlkL42
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2792-1-0x0000000001010000-0x0000000001050000-memory.dmp family_umbral -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2644 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts TOKEN BOT.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 discord.com 9 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1552 wmic.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2644 powershell.exe 2692 powershell.exe 2184 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2792 TOKEN BOT.exe Token: SeDebugPrivilege 2644 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeIncreaseQuotaPrivilege 2876 wmic.exe Token: SeSecurityPrivilege 2876 wmic.exe Token: SeTakeOwnershipPrivilege 2876 wmic.exe Token: SeLoadDriverPrivilege 2876 wmic.exe Token: SeSystemProfilePrivilege 2876 wmic.exe Token: SeSystemtimePrivilege 2876 wmic.exe Token: SeProfSingleProcessPrivilege 2876 wmic.exe Token: SeIncBasePriorityPrivilege 2876 wmic.exe Token: SeCreatePagefilePrivilege 2876 wmic.exe Token: SeBackupPrivilege 2876 wmic.exe Token: SeRestorePrivilege 2876 wmic.exe Token: SeShutdownPrivilege 2876 wmic.exe Token: SeDebugPrivilege 2876 wmic.exe Token: SeSystemEnvironmentPrivilege 2876 wmic.exe Token: SeRemoteShutdownPrivilege 2876 wmic.exe Token: SeUndockPrivilege 2876 wmic.exe Token: SeManageVolumePrivilege 2876 wmic.exe Token: 33 2876 wmic.exe Token: 34 2876 wmic.exe Token: 35 2876 wmic.exe Token: SeIncreaseQuotaPrivilege 2876 wmic.exe Token: SeSecurityPrivilege 2876 wmic.exe Token: SeTakeOwnershipPrivilege 2876 wmic.exe Token: SeLoadDriverPrivilege 2876 wmic.exe Token: SeSystemProfilePrivilege 2876 wmic.exe Token: SeSystemtimePrivilege 2876 wmic.exe Token: SeProfSingleProcessPrivilege 2876 wmic.exe Token: SeIncBasePriorityPrivilege 2876 wmic.exe Token: SeCreatePagefilePrivilege 2876 wmic.exe Token: SeBackupPrivilege 2876 wmic.exe Token: SeRestorePrivilege 2876 wmic.exe Token: SeShutdownPrivilege 2876 wmic.exe Token: SeDebugPrivilege 2876 wmic.exe Token: SeSystemEnvironmentPrivilege 2876 wmic.exe Token: SeRemoteShutdownPrivilege 2876 wmic.exe Token: SeUndockPrivilege 2876 wmic.exe Token: SeManageVolumePrivilege 2876 wmic.exe Token: 33 2876 wmic.exe Token: 34 2876 wmic.exe Token: 35 2876 wmic.exe Token: SeIncreaseQuotaPrivilege 2592 wmic.exe Token: SeSecurityPrivilege 2592 wmic.exe Token: SeTakeOwnershipPrivilege 2592 wmic.exe Token: SeLoadDriverPrivilege 2592 wmic.exe Token: SeSystemProfilePrivilege 2592 wmic.exe Token: SeSystemtimePrivilege 2592 wmic.exe Token: SeProfSingleProcessPrivilege 2592 wmic.exe Token: SeIncBasePriorityPrivilege 2592 wmic.exe Token: SeCreatePagefilePrivilege 2592 wmic.exe Token: SeBackupPrivilege 2592 wmic.exe Token: SeRestorePrivilege 2592 wmic.exe Token: SeShutdownPrivilege 2592 wmic.exe Token: SeDebugPrivilege 2592 wmic.exe Token: SeSystemEnvironmentPrivilege 2592 wmic.exe Token: SeRemoteShutdownPrivilege 2592 wmic.exe Token: SeUndockPrivilege 2592 wmic.exe Token: SeManageVolumePrivilege 2592 wmic.exe Token: 33 2592 wmic.exe Token: 34 2592 wmic.exe Token: 35 2592 wmic.exe Token: SeIncreaseQuotaPrivilege 2592 wmic.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2644 2792 TOKEN BOT.exe 28 PID 2792 wrote to memory of 2644 2792 TOKEN BOT.exe 28 PID 2792 wrote to memory of 2644 2792 TOKEN BOT.exe 28 PID 2792 wrote to memory of 2692 2792 TOKEN BOT.exe 30 PID 2792 wrote to memory of 2692 2792 TOKEN BOT.exe 30 PID 2792 wrote to memory of 2692 2792 TOKEN BOT.exe 30 PID 2792 wrote to memory of 2876 2792 TOKEN BOT.exe 32 PID 2792 wrote to memory of 2876 2792 TOKEN BOT.exe 32 PID 2792 wrote to memory of 2876 2792 TOKEN BOT.exe 32 PID 2792 wrote to memory of 2592 2792 TOKEN BOT.exe 35 PID 2792 wrote to memory of 2592 2792 TOKEN BOT.exe 35 PID 2792 wrote to memory of 2592 2792 TOKEN BOT.exe 35 PID 2792 wrote to memory of 2756 2792 TOKEN BOT.exe 37 PID 2792 wrote to memory of 2756 2792 TOKEN BOT.exe 37 PID 2792 wrote to memory of 2756 2792 TOKEN BOT.exe 37 PID 2792 wrote to memory of 2184 2792 TOKEN BOT.exe 39 PID 2792 wrote to memory of 2184 2792 TOKEN BOT.exe 39 PID 2792 wrote to memory of 2184 2792 TOKEN BOT.exe 39 PID 2792 wrote to memory of 1552 2792 TOKEN BOT.exe 41 PID 2792 wrote to memory of 1552 2792 TOKEN BOT.exe 41 PID 2792 wrote to memory of 1552 2792 TOKEN BOT.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\TOKEN BOT.exe"C:\Users\Admin\AppData\Local\Temp\TOKEN BOT.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\TOKEN BOT.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2184
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1552
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MY47SOA1A7Q2N3782NTN.temp
Filesize7KB
MD507931a2700568a0e061ff78c59486a2e
SHA1bc6379bc7e6810f4f2f4e820f87e218755f38beb
SHA256896ad26d241423d5b0c6d5e9d66b7d51fb8743731c5657e4695cf170e5a2e445
SHA5127d688838d48a91022e8e75be8d6c1ec7a49d8ee77f3ee08023fcec325540479a8ca2fe57e4f53d336c06a841682905053d1c0f8840be1faf1c0f0a0f7246ee9f