Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2024 08:38

General

  • Target

    Solaro.exe

  • Size

    513KB

  • MD5

    b9a7b8d97ac9e492b592e723c47f3f71

  • SHA1

    840d72ade351c907ef21ffc9c87f948016219286

  • SHA256

    80a2a856062d5fdfc9a8d3f68fe717e5128f87ea9fe286e545f45886e1c4ab17

  • SHA512

    4c1cc3b0ef59a4689d2b70778360737c9fc86b4ed0395f303cf4a9a3ae27a1aee8b1140907953c12ba58ffac7709d9e895578a64dd0547f5d14c4cd5d29ae1e9

  • SSDEEP

    12288:cSgkiATxhl6E41yG5uuo0kD4qiGLJROQZZMQPX:3gkiAUhRYuw4HG9XZ+

Score
10/10

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1255440152264708116/e78YrGll2h6-MFL5WBXh0buoJQb4Q69Z5cO34I92dvicPnzPfxpjHhlb2KFfvFVxGUhf

Signatures

  • Detect Umbral payload 35 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Executes dropped EXE 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Solaro.exe
    "C:\Users\Admin\AppData\Local\Temp\Solaro.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
        "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
            "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:928
            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:320
              • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2184
                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1228
                  • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                    "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:496
                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                      10⤵
                      • Executes dropped EXE
                      PID:1888
                      • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                        "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                        11⤵
                        • Executes dropped EXE
                        PID:1180
                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                          12⤵
                          • Executes dropped EXE
                          PID:2968
                          • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                            "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                            13⤵
                            • Executes dropped EXE
                            PID:3016
                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                              14⤵
                              • Executes dropped EXE
                              PID:2484
                              • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                15⤵
                                • Executes dropped EXE
                                PID:1084
                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                  16⤵
                                  • Executes dropped EXE
                                  PID:936
                                  • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                    "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                    17⤵
                                    • Executes dropped EXE
                                    PID:1256
                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                      18⤵
                                      • Executes dropped EXE
                                      PID:2276
                                      • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                        "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                        19⤵
                                        • Executes dropped EXE
                                        PID:444
                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                          20⤵
                                          • Executes dropped EXE
                                          PID:1800
                                          • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                            "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                            21⤵
                                            • Executes dropped EXE
                                            PID:2852
                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                              22⤵
                                              • Executes dropped EXE
                                              PID:1564
                                              • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                23⤵
                                                • Executes dropped EXE
                                                PID:2888
                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                  24⤵
                                                  • Executes dropped EXE
                                                  PID:2836
                                                  • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                    "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                    25⤵
                                                    • Executes dropped EXE
                                                    PID:1624
                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                      26⤵
                                                      • Executes dropped EXE
                                                      PID:1972
                                                      • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                        27⤵
                                                        • Executes dropped EXE
                                                        PID:2676
                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                          28⤵
                                                          • Executes dropped EXE
                                                          PID:484
                                                          • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                            29⤵
                                                            • Executes dropped EXE
                                                            PID:1796
                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                              30⤵
                                                              • Executes dropped EXE
                                                              PID:2668
                                                              • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                31⤵
                                                                • Executes dropped EXE
                                                                PID:1856
                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  PID:752
                                                                  • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    PID:1828
                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                      34⤵
                                                                        PID:2320
                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                          35⤵
                                                                            PID:2176
                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                              36⤵
                                                                                PID:2832
                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                  37⤵
                                                                                    PID:2536
                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                      38⤵
                                                                                        PID:1320
                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                          39⤵
                                                                                            PID:2440
                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                              40⤵
                                                                                                PID:1556
                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                  41⤵
                                                                                                    PID:612
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                      42⤵
                                                                                                        PID:1308
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                          43⤵
                                                                                                            PID:2848
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                              44⤵
                                                                                                                PID:1852
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                  45⤵
                                                                                                                    PID:2204
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                      46⤵
                                                                                                                        PID:2148
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                          47⤵
                                                                                                                            PID:2036
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                              48⤵
                                                                                                                                PID:2420
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                  49⤵
                                                                                                                                    PID:2708
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                      50⤵
                                                                                                                                        PID:2580
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                          51⤵
                                                                                                                                            PID:1808
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                              52⤵
                                                                                                                                                PID:1160
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                  53⤵
                                                                                                                                                    PID:2152
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                      54⤵
                                                                                                                                                        PID:1924
                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                          55⤵
                                                                                                                                                            PID:1012
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                              56⤵
                                                                                                                                                                PID:1840
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                  57⤵
                                                                                                                                                                    PID:1588
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                      58⤵
                                                                                                                                                                        PID:1560
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                          59⤵
                                                                                                                                                                            PID:3016
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                              60⤵
                                                                                                                                                                                PID:2740
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                  61⤵
                                                                                                                                                                                    PID:2936
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                      62⤵
                                                                                                                                                                                        PID:2536
                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                          63⤵
                                                                                                                                                                                            PID:2904
                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                              64⤵
                                                                                                                                                                                                PID:2688
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                  65⤵
                                                                                                                                                                                                    PID:1716
                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                      66⤵
                                                                                                                                                                                                        PID:496
                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                          67⤵
                                                                                                                                                                                                            PID:1196
                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                              68⤵
                                                                                                                                                                                                                PID:924
                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                                  69⤵
                                                                                                                                                                                                                    PID:1612
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                                      70⤵
                                                                                                                                                                                                                        PID:2208
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                                          71⤵
                                                                                                                                                                                                                            PID:2696
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe
                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaroB.exe"
                                                                                                                                                                                                                              72⤵
                                                                                                                                                                                                                                PID:2380
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                72⤵
                                                                                                                                                                                                                                  PID:2700
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                71⤵
                                                                                                                                                                                                                                  PID:1836
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                70⤵
                                                                                                                                                                                                                                  PID:2212
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                69⤵
                                                                                                                                                                                                                                  PID:2824
                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                    70⤵
                                                                                                                                                                                                                                      PID:1620
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                  68⤵
                                                                                                                                                                                                                                    PID:1308
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                  67⤵
                                                                                                                                                                                                                                    PID:2144
                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                      "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                      68⤵
                                                                                                                                                                                                                                        PID:1012
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                    66⤵
                                                                                                                                                                                                                                      PID:400
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                    65⤵
                                                                                                                                                                                                                                      PID:1904
                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                        "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                        66⤵
                                                                                                                                                                                                                                          PID:536
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                      64⤵
                                                                                                                                                                                                                                        PID:1636
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                      63⤵
                                                                                                                                                                                                                                        PID:1776
                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                          "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                          64⤵
                                                                                                                                                                                                                                            PID:1256
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                        62⤵
                                                                                                                                                                                                                                          PID:812
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                        61⤵
                                                                                                                                                                                                                                          PID:2460
                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                            "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                            62⤵
                                                                                                                                                                                                                                              PID:928
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                          60⤵
                                                                                                                                                                                                                                            PID:2100
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                          59⤵
                                                                                                                                                                                                                                            PID:944
                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                              "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                              60⤵
                                                                                                                                                                                                                                                PID:1712
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                            58⤵
                                                                                                                                                                                                                                              PID:2796
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                            57⤵
                                                                                                                                                                                                                                              PID:2856
                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                58⤵
                                                                                                                                                                                                                                                  PID:2448
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                              56⤵
                                                                                                                                                                                                                                                PID:3032
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                              55⤵
                                                                                                                                                                                                                                                PID:2356
                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                  "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                  56⤵
                                                                                                                                                                                                                                                    PID:3052
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                54⤵
                                                                                                                                                                                                                                                  PID:1052
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                53⤵
                                                                                                                                                                                                                                                  PID:1796
                                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                    54⤵
                                                                                                                                                                                                                                                      PID:1540
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                  52⤵
                                                                                                                                                                                                                                                    PID:2688
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                  51⤵
                                                                                                                                                                                                                                                    PID:2112
                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                      "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                      52⤵
                                                                                                                                                                                                                                                        PID:3024
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                    50⤵
                                                                                                                                                                                                                                                      PID:2052
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                    49⤵
                                                                                                                                                                                                                                                      PID:2772
                                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                        "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                        50⤵
                                                                                                                                                                                                                                                          PID:2716
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                      48⤵
                                                                                                                                                                                                                                                        PID:896
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                      47⤵
                                                                                                                                                                                                                                                        PID:1780
                                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                          "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                          48⤵
                                                                                                                                                                                                                                                            PID:1680
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                        46⤵
                                                                                                                                                                                                                                                          PID:2820
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                        45⤵
                                                                                                                                                                                                                                                          PID:1828
                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                            "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                            46⤵
                                                                                                                                                                                                                                                              PID:1928
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                          44⤵
                                                                                                                                                                                                                                                            PID:2864
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                          43⤵
                                                                                                                                                                                                                                                            PID:2964
                                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                              "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                              44⤵
                                                                                                                                                                                                                                                                PID:1516
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                            42⤵
                                                                                                                                                                                                                                                              PID:444
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                            41⤵
                                                                                                                                                                                                                                                              PID:108
                                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                42⤵
                                                                                                                                                                                                                                                                  PID:1228
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                              40⤵
                                                                                                                                                                                                                                                                PID:596
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                              39⤵
                                                                                                                                                                                                                                                                PID:572
                                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                  "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                  40⤵
                                                                                                                                                                                                                                                                    PID:832
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                38⤵
                                                                                                                                                                                                                                                                  PID:2388
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                37⤵
                                                                                                                                                                                                                                                                  PID:1168
                                                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                    38⤵
                                                                                                                                                                                                                                                                      PID:1756
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                  36⤵
                                                                                                                                                                                                                                                                    PID:2492
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                  35⤵
                                                                                                                                                                                                                                                                    PID:1172
                                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                      "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                      36⤵
                                                                                                                                                                                                                                                                        PID:2920
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                    34⤵
                                                                                                                                                                                                                                                                      PID:2312
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                    33⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    PID:1560
                                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                      "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                      34⤵
                                                                                                                                                                                                                                                                        PID:2140
                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                    32⤵
                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                    PID:1164
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                  31⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:1852
                                                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                    32⤵
                                                                                                                                                                                                                                                                      PID:2024
                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                  30⤵
                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                  PID:1916
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                29⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:1752
                                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                  "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                  30⤵
                                                                                                                                                                                                                                                                    PID:900
                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                                28⤵
                                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                                PID:2232
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                              27⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:2156
                                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                                "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                                28⤵
                                                                                                                                                                                                                                                                  PID:1656
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                              26⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              PID:2572
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                            25⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:2644
                                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                              "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                              26⤵
                                                                                                                                                                                                                                                                PID:2272
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                            24⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            PID:2468
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                          23⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          PID:2068
                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                            "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                            24⤵
                                                                                                                                                                                                                                                              PID:944
                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                          22⤵
                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                          PID:1860
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                        21⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        PID:868
                                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                          "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                          22⤵
                                                                                                                                                                                                                                                            PID:2180
                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                        20⤵
                                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                                        PID:348
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                      19⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      PID:2444
                                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                        "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                        20⤵
                                                                                                                                                                                                                                                          PID:1052
                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                      18⤵
                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                      PID:268
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                    17⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:1308
                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                      "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                      18⤵
                                                                                                                                                                                                                                                        PID:968
                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                    16⤵
                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                    PID:2812
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                  15⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:2156
                                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                    16⤵
                                                                                                                                                                                                                                                      PID:1672
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                  14⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  PID:2524
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                13⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:2608
                                                                                                                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                  "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                  14⤵
                                                                                                                                                                                                                                                    PID:2672
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                                12⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                PID:2988
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                              11⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:2004
                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                                "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                                12⤵
                                                                                                                                                                                                                                                  PID:2960
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:1664
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                            9⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                            PID:3052
                                                                                                                                                                                                                                            • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                              "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                              10⤵
                                                                                                                                                                                                                                                PID:1700
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            PID:572
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                          7⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                          PID:876
                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                            "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                            8⤵
                                                                                                                                                                                                                                              PID:1160
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          PID:932
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Modifies system certificate store
                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                        • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                        PID:1796
                                                                                                                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                          "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                          PID:2188
                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                      PID:2396
                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                    PID:2620
                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                                                                                                                                  PID:2160
                                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                    PID:1848

                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\SolaroB.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                416KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                61c0431f9f53ae84d9907354c08c997d

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                e2bc204b091c5bd391261fecdc5e5c81e2d7c129

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                cade9d8c77eaf397cf2fd28e0bab0becc79a66b2c6a9d338e2d8411d62e757b2

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                950ffd12606be726374241977e8094a992b5a91afbf841eca1f7f43e8f2d3bddac743ff03a18700570a399db4b6f324fd79213d53c1c523bf375f5ecaf16d6e4

                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                230KB

                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                d5a61fff058c6015802f7dc8c75684d1

                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                60170c1a41b778c17ba886b7f6ec71c1ab6cfd44

                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                3e0d91b0c5b67446c6fcbb9f30d079dd54381d6fdea2cec74f4dcc0e2334b155

                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                537b85584a931a7984fccbc62a41c92d406c399212d9b25fdac39b14e12f0d82be67583c88d1b70bf9c0a8c0cf2d5a7c6fcfbf83332bf251e2afe3767232338d

                                                                                                                                                                                                                              • memory/108-167-0x00000000008A0000-0x00000000008E0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/572-163-0x00000000002D0000-0x0000000000310000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/868-114-0x0000000000060000-0x00000000000A0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/876-51-0x0000000000D80000-0x0000000000DC0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/944-203-0x0000000000CF0000-0x0000000000D30000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1168-159-0x0000000001310000-0x0000000001350000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1172-155-0x0000000000F30000-0x0000000000F70000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1308-96-0x0000000001020000-0x0000000001060000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1560-151-0x0000000000300000-0x0000000000340000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1752-143-0x0000000000100000-0x0000000000140000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1776-211-0x0000000000120000-0x0000000000160000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1780-179-0x0000000001150000-0x0000000001190000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1796-42-0x00000000010A0000-0x00000000010E0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1796-191-0x00000000009C0000-0x0000000000A00000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1828-175-0x00000000008E0000-0x0000000000920000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1852-147-0x0000000000F70000-0x0000000000FB0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/1904-215-0x0000000000E20000-0x0000000000E60000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2004-69-0x0000000000FF0000-0x0000000001030000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2068-123-0x00000000013B0000-0x00000000013F0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2112-187-0x0000000001100000-0x0000000001140000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2144-219-0x00000000009F0000-0x0000000000A30000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2156-87-0x0000000000820000-0x0000000000860000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2156-139-0x0000000000920000-0x0000000000960000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2160-14-0x00000000002A0000-0x00000000002E0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2356-195-0x0000000000B90000-0x0000000000BD0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2444-105-0x0000000000160000-0x00000000001A0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2460-207-0x0000000001120000-0x0000000001160000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2608-78-0x0000000001360000-0x00000000013A0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2644-132-0x0000000000D40000-0x0000000000D80000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2772-15-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                                              • memory/2772-183-0x0000000000FE0000-0x0000000001020000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2772-10-0x0000000000A90000-0x0000000000AFE000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                440KB

                                                                                                                                                                                                                              • memory/2772-19-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                                              • memory/2824-223-0x0000000000EA0000-0x0000000000EE0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2856-199-0x0000000000F40000-0x0000000000F80000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/2880-16-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                                              • memory/2880-4-0x000007FEF5F10000-0x000007FEF68FC000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                9.9MB

                                                                                                                                                                                                                              • memory/2880-0-0x000007FEF5F13000-0x000007FEF5F14000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                              • memory/2880-1-0x0000000000C50000-0x0000000000CD6000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                536KB

                                                                                                                                                                                                                              • memory/2964-171-0x0000000000390000-0x00000000003D0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB

                                                                                                                                                                                                                              • memory/3052-60-0x0000000000AB0000-0x0000000000AF0000-memory.dmp

                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                256KB