Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 11:05

General

  • Target

    Umbral.exe

  • Size

    231KB

  • MD5

    c6d9062fe7fa14a33531fab3d8d53e04

  • SHA1

    9324cc22d65cfaaa4b4b35c978db9e5039d36c2b

  • SHA256

    4df5b468a1be632ec9814e7060ab85d055c75dd913b48c24a978d7357f377449

  • SHA512

    ed30c2a44431900279dc0ecf6325971bcb22149b3143c0c1ca4b5b0ea3f3a5ce85617b8c317b93bdfdfff4afd349330242c68578d8755f31ef48663efe41849d

  • SSDEEP

    6144:xloZM+rIkd8g+EtXHkv/iD4Ooph/1+mpesl3ySX4MvHb8e1mv4li:DoZtL+EP8Ooph/1+mpesl3ySXpJs

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3056
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2712
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:2996
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:2856
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2988

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2712-9-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2712-6-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2712-5-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2712-7-0x0000000002050000-0x0000000002060000-memory.dmp

      Filesize

      64KB

    • memory/2712-8-0x0000000140000000-0x00000001405E8000-memory.dmp

      Filesize

      5.9MB

    • memory/2712-10-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/2712-12-0x0000000002060000-0x0000000002061000-memory.dmp

      Filesize

      4KB

    • memory/3056-1-0x00000000002F0000-0x0000000000330000-memory.dmp

      Filesize

      256KB

    • memory/3056-2-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

      Filesize

      9.9MB

    • memory/3056-3-0x000007FEF55D3000-0x000007FEF55D4000-memory.dmp

      Filesize

      4KB

    • memory/3056-4-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

      Filesize

      9.9MB

    • memory/3056-0-0x000007FEF55D3000-0x000007FEF55D4000-memory.dmp

      Filesize

      4KB

    • memory/3056-11-0x000007FEF55D0000-0x000007FEF5FBC000-memory.dmp

      Filesize

      9.9MB