Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
26-06-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
New Project 1.exe
Resource
win7-20240221-en
General
-
Target
New Project 1.exe
-
Size
2.8MB
-
MD5
db5a82d0ebc91356da9a392623ef4091
-
SHA1
a264cb459225c04cfcc77d06286f043404abc995
-
SHA256
0c6199877d4e33673f8382783092bed633fb5c763cfecaefa868becb90552574
-
SHA512
51a88d50ca409e11355b0b1966298ab89c5003eabfca200af844dba4010fe22ac1e85525c9dcbd4afc06353d282d5579aa3fb1cf71218e7c5a0fd5ab789ceb8b
-
SSDEEP
49152:obKHLmcpC9UO0fabN1NVnfJVeAqqI8bmCMFjl4UwFUy:WznOaxVBYAqqNnIwFU
Malware Config
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral2/memory/3064-0-0x0000000000400000-0x00000000006D4000-memory.dmp family_umbral behavioral2/files/0x00070000000233ee-63.dat family_umbral behavioral2/memory/1864-120-0x000001D56B700000-0x000001D56B740000-memory.dmp family_umbral -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4728 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 12345768.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation New Project 1.exe -
Executes dropped EXE 2 IoCs
pid Process 4092 xdwd.exe 1864 12345768.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 discord.com 21 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4624 wmic.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ New Project 1.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2044 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1864 12345768.exe 4728 powershell.exe 4728 powershell.exe 1000 powershell.exe 1000 powershell.exe 1548 powershell.exe 1548 powershell.exe 3560 powershell.exe 3560 powershell.exe 4760 powershell.exe 4760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1864 12345768.exe Token: SeIncreaseQuotaPrivilege 3744 wmic.exe Token: SeSecurityPrivilege 3744 wmic.exe Token: SeTakeOwnershipPrivilege 3744 wmic.exe Token: SeLoadDriverPrivilege 3744 wmic.exe Token: SeSystemProfilePrivilege 3744 wmic.exe Token: SeSystemtimePrivilege 3744 wmic.exe Token: SeProfSingleProcessPrivilege 3744 wmic.exe Token: SeIncBasePriorityPrivilege 3744 wmic.exe Token: SeCreatePagefilePrivilege 3744 wmic.exe Token: SeBackupPrivilege 3744 wmic.exe Token: SeRestorePrivilege 3744 wmic.exe Token: SeShutdownPrivilege 3744 wmic.exe Token: SeDebugPrivilege 3744 wmic.exe Token: SeSystemEnvironmentPrivilege 3744 wmic.exe Token: SeRemoteShutdownPrivilege 3744 wmic.exe Token: SeUndockPrivilege 3744 wmic.exe Token: SeManageVolumePrivilege 3744 wmic.exe Token: 33 3744 wmic.exe Token: 34 3744 wmic.exe Token: 35 3744 wmic.exe Token: 36 3744 wmic.exe Token: SeIncreaseQuotaPrivilege 3744 wmic.exe Token: SeSecurityPrivilege 3744 wmic.exe Token: SeTakeOwnershipPrivilege 3744 wmic.exe Token: SeLoadDriverPrivilege 3744 wmic.exe Token: SeSystemProfilePrivilege 3744 wmic.exe Token: SeSystemtimePrivilege 3744 wmic.exe Token: SeProfSingleProcessPrivilege 3744 wmic.exe Token: SeIncBasePriorityPrivilege 3744 wmic.exe Token: SeCreatePagefilePrivilege 3744 wmic.exe Token: SeBackupPrivilege 3744 wmic.exe Token: SeRestorePrivilege 3744 wmic.exe Token: SeShutdownPrivilege 3744 wmic.exe Token: SeDebugPrivilege 3744 wmic.exe Token: SeSystemEnvironmentPrivilege 3744 wmic.exe Token: SeRemoteShutdownPrivilege 3744 wmic.exe Token: SeUndockPrivilege 3744 wmic.exe Token: SeManageVolumePrivilege 3744 wmic.exe Token: 33 3744 wmic.exe Token: 34 3744 wmic.exe Token: 35 3744 wmic.exe Token: 36 3744 wmic.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeDebugPrivilege 1000 powershell.exe Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 3560 powershell.exe Token: SeIncreaseQuotaPrivilege 4656 wmic.exe Token: SeSecurityPrivilege 4656 wmic.exe Token: SeTakeOwnershipPrivilege 4656 wmic.exe Token: SeLoadDriverPrivilege 4656 wmic.exe Token: SeSystemProfilePrivilege 4656 wmic.exe Token: SeSystemtimePrivilege 4656 wmic.exe Token: SeProfSingleProcessPrivilege 4656 wmic.exe Token: SeIncBasePriorityPrivilege 4656 wmic.exe Token: SeCreatePagefilePrivilege 4656 wmic.exe Token: SeBackupPrivilege 4656 wmic.exe Token: SeRestorePrivilege 4656 wmic.exe Token: SeShutdownPrivilege 4656 wmic.exe Token: SeDebugPrivilege 4656 wmic.exe Token: SeSystemEnvironmentPrivilege 4656 wmic.exe Token: SeRemoteShutdownPrivilege 4656 wmic.exe Token: SeUndockPrivilege 4656 wmic.exe Token: SeManageVolumePrivilege 4656 wmic.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 3064 wrote to memory of 4092 3064 New Project 1.exe 81 PID 3064 wrote to memory of 4092 3064 New Project 1.exe 81 PID 3064 wrote to memory of 4092 3064 New Project 1.exe 81 PID 3064 wrote to memory of 1864 3064 New Project 1.exe 82 PID 3064 wrote to memory of 1864 3064 New Project 1.exe 82 PID 1864 wrote to memory of 3744 1864 12345768.exe 84 PID 1864 wrote to memory of 3744 1864 12345768.exe 84 PID 1864 wrote to memory of 2968 1864 12345768.exe 86 PID 1864 wrote to memory of 2968 1864 12345768.exe 86 PID 1864 wrote to memory of 4728 1864 12345768.exe 88 PID 1864 wrote to memory of 4728 1864 12345768.exe 88 PID 1864 wrote to memory of 1000 1864 12345768.exe 90 PID 1864 wrote to memory of 1000 1864 12345768.exe 90 PID 1864 wrote to memory of 1548 1864 12345768.exe 94 PID 1864 wrote to memory of 1548 1864 12345768.exe 94 PID 1864 wrote to memory of 3560 1864 12345768.exe 96 PID 1864 wrote to memory of 3560 1864 12345768.exe 96 PID 1864 wrote to memory of 4656 1864 12345768.exe 99 PID 1864 wrote to memory of 4656 1864 12345768.exe 99 PID 1864 wrote to memory of 4440 1864 12345768.exe 101 PID 1864 wrote to memory of 4440 1864 12345768.exe 101 PID 1864 wrote to memory of 2432 1864 12345768.exe 103 PID 1864 wrote to memory of 2432 1864 12345768.exe 103 PID 1864 wrote to memory of 4760 1864 12345768.exe 105 PID 1864 wrote to memory of 4760 1864 12345768.exe 105 PID 1864 wrote to memory of 4624 1864 12345768.exe 107 PID 1864 wrote to memory of 4624 1864 12345768.exe 107 PID 1864 wrote to memory of 2240 1864 12345768.exe 109 PID 1864 wrote to memory of 2240 1864 12345768.exe 109 PID 2240 wrote to memory of 2044 2240 cmd.exe 111 PID 2240 wrote to memory of 2044 2240 cmd.exe 111 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2968 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\xdwd.exe"C:\Users\Admin\AppData\Local\xdwd.exe"2⤵
- Executes dropped EXE
PID:4092
-
-
C:\Users\Admin\AppData\Local\Temp\12345768.exe"C:\Users\Admin\AppData\Local\Temp\12345768.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\12345768.exe"3⤵
- Views/modifies file attributes
PID:2968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\12345768.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:4440
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:4624
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\12345768.exe" && pause3⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\system32\PING.EXEping localhost4⤵
- Runs ping.exe
PID:2044
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
948B
MD5985b3105d8889886d6fd953575c54e08
SHA10f9a041240a344d82bac0a180520e7982c15f3cd
SHA2565178fdd457eb3eb25c8f72ed4c22c582a83de0d324db66d0446d660f226e944d
SHA5120fd59bc4886b70aa3b7eeeaa23229b7fdc93410ca7f8452860e4a1bbda2559eaa5e4b05c3ec2d85f7d648daf3c16741f4c2c18f2dd3bae4cc4a4e57ae4f665b0
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
1KB
MD56aab9e4981c2519c41773cd2959610c3
SHA1ee6fd0bea4d673fcd3d5dbb2bf30bd21a8c3405b
SHA256d497af4e36e7dd2db0bf4b32b9b3339cadcde5a69d3cc64f6154fcb9d9a6dd36
SHA5121919613172c02c50b367f7db74851a1d3589763f7bc9edea3e272f50e8ec7ebffd89aee6b6f45323dc2d4e5f70a0494fba7348a36ae9fbd5307559cc8ead1b13
-
Filesize
229KB
MD52f4f52ff66406c1469b08e47d3ac9bc2
SHA13414426471b257a2da77860c2d52a0ef0d05f485
SHA25616aa26d084bc366c27a547f0ed5e5f7ac001b3f95355b9809cb5bfeff00dc5f0
SHA512e622fcdddc0a4ae7d5afd60cf81f347192ae673ab2c19dbe6d1bf70b08c8309d315088bb20474edae8d3a1ef85b1f949bfc62016eb5632edfe6304fe04603986
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD5bf4577bd343e7054fb178671a453d6ab
SHA110bff3a3100cf7cd718e2dc857e4ce70d6075473
SHA256efa96d492077c2ad6bc002425716137714587937824792a6f20e0705f8395755
SHA512c5a7c31767411761afa58c696a9e38e6e6c0c08eb8021015aa57a775fb1f053680c1459a1aad62795770c85153a226509422a95f56482f004df8030d505beeb2