Resubmissions
29-06-2024 16:53
240629-vd8x8s1fqg 10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 16:53
Behavioral task
behavioral1
Sample
CheatLoader.js
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
CheatLoader.js
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Complex Softaim Cracked.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Complex Softaim Cracked.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
DLL Injector.exe
Resource
win7-20240611-en
General
-
Target
Complex Softaim Cracked.exe
-
Size
293KB
-
MD5
6dad101a84200598ebab60f17bee37a4
-
SHA1
41e48f77329c1ce4cf165de9008bdf790af6947a
-
SHA256
174e2a9c2a37b2650d9a10421b880572cbd5a87440eb77b85398be00c2228a24
-
SHA512
00cbe80d83c8512dfa474f1c6e7bd85f8207748cb1ffc2c3cfa3a28cc551096add77af722283557e8cdc398d0bc9c551d0f9f0d19b6efb5356bc0e0611155201
-
SSDEEP
6144:GloZMFrIkd8g+EtXHkv/iD4UaIH+n9GuBk0dP6aPcQb8e1mviI:woZOL+EP8UaIH+n9GuBk0dP6aP1tI
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral3/memory/1700-1-0x0000000000B90000-0x0000000000BE0000-memory.dmp family_umbral -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2672 powershell.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1844 wmic.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1700 Complex Softaim Cracked.exe 2672 powershell.exe 2556 powershell.exe 2560 powershell.exe 2836 powershell.exe 1432 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1700 Complex Softaim Cracked.exe Token: SeIncreaseQuotaPrivilege 2404 wmic.exe Token: SeSecurityPrivilege 2404 wmic.exe Token: SeTakeOwnershipPrivilege 2404 wmic.exe Token: SeLoadDriverPrivilege 2404 wmic.exe Token: SeSystemProfilePrivilege 2404 wmic.exe Token: SeSystemtimePrivilege 2404 wmic.exe Token: SeProfSingleProcessPrivilege 2404 wmic.exe Token: SeIncBasePriorityPrivilege 2404 wmic.exe Token: SeCreatePagefilePrivilege 2404 wmic.exe Token: SeBackupPrivilege 2404 wmic.exe Token: SeRestorePrivilege 2404 wmic.exe Token: SeShutdownPrivilege 2404 wmic.exe Token: SeDebugPrivilege 2404 wmic.exe Token: SeSystemEnvironmentPrivilege 2404 wmic.exe Token: SeRemoteShutdownPrivilege 2404 wmic.exe Token: SeUndockPrivilege 2404 wmic.exe Token: SeManageVolumePrivilege 2404 wmic.exe Token: 33 2404 wmic.exe Token: 34 2404 wmic.exe Token: 35 2404 wmic.exe Token: SeIncreaseQuotaPrivilege 2404 wmic.exe Token: SeSecurityPrivilege 2404 wmic.exe Token: SeTakeOwnershipPrivilege 2404 wmic.exe Token: SeLoadDriverPrivilege 2404 wmic.exe Token: SeSystemProfilePrivilege 2404 wmic.exe Token: SeSystemtimePrivilege 2404 wmic.exe Token: SeProfSingleProcessPrivilege 2404 wmic.exe Token: SeIncBasePriorityPrivilege 2404 wmic.exe Token: SeCreatePagefilePrivilege 2404 wmic.exe Token: SeBackupPrivilege 2404 wmic.exe Token: SeRestorePrivilege 2404 wmic.exe Token: SeShutdownPrivilege 2404 wmic.exe Token: SeDebugPrivilege 2404 wmic.exe Token: SeSystemEnvironmentPrivilege 2404 wmic.exe Token: SeRemoteShutdownPrivilege 2404 wmic.exe Token: SeUndockPrivilege 2404 wmic.exe Token: SeManageVolumePrivilege 2404 wmic.exe Token: 33 2404 wmic.exe Token: 34 2404 wmic.exe Token: 35 2404 wmic.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 2836 powershell.exe Token: SeIncreaseQuotaPrivilege 2636 wmic.exe Token: SeSecurityPrivilege 2636 wmic.exe Token: SeTakeOwnershipPrivilege 2636 wmic.exe Token: SeLoadDriverPrivilege 2636 wmic.exe Token: SeSystemProfilePrivilege 2636 wmic.exe Token: SeSystemtimePrivilege 2636 wmic.exe Token: SeProfSingleProcessPrivilege 2636 wmic.exe Token: SeIncBasePriorityPrivilege 2636 wmic.exe Token: SeCreatePagefilePrivilege 2636 wmic.exe Token: SeBackupPrivilege 2636 wmic.exe Token: SeRestorePrivilege 2636 wmic.exe Token: SeShutdownPrivilege 2636 wmic.exe Token: SeDebugPrivilege 2636 wmic.exe Token: SeSystemEnvironmentPrivilege 2636 wmic.exe Token: SeRemoteShutdownPrivilege 2636 wmic.exe Token: SeUndockPrivilege 2636 wmic.exe Token: SeManageVolumePrivilege 2636 wmic.exe Token: 33 2636 wmic.exe Token: 34 2636 wmic.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2404 1700 Complex Softaim Cracked.exe 28 PID 1700 wrote to memory of 2404 1700 Complex Softaim Cracked.exe 28 PID 1700 wrote to memory of 2404 1700 Complex Softaim Cracked.exe 28 PID 1700 wrote to memory of 2672 1700 Complex Softaim Cracked.exe 31 PID 1700 wrote to memory of 2672 1700 Complex Softaim Cracked.exe 31 PID 1700 wrote to memory of 2672 1700 Complex Softaim Cracked.exe 31 PID 1700 wrote to memory of 2556 1700 Complex Softaim Cracked.exe 33 PID 1700 wrote to memory of 2556 1700 Complex Softaim Cracked.exe 33 PID 1700 wrote to memory of 2556 1700 Complex Softaim Cracked.exe 33 PID 1700 wrote to memory of 2560 1700 Complex Softaim Cracked.exe 35 PID 1700 wrote to memory of 2560 1700 Complex Softaim Cracked.exe 35 PID 1700 wrote to memory of 2560 1700 Complex Softaim Cracked.exe 35 PID 1700 wrote to memory of 2836 1700 Complex Softaim Cracked.exe 37 PID 1700 wrote to memory of 2836 1700 Complex Softaim Cracked.exe 37 PID 1700 wrote to memory of 2836 1700 Complex Softaim Cracked.exe 37 PID 1700 wrote to memory of 2636 1700 Complex Softaim Cracked.exe 39 PID 1700 wrote to memory of 2636 1700 Complex Softaim Cracked.exe 39 PID 1700 wrote to memory of 2636 1700 Complex Softaim Cracked.exe 39 PID 1700 wrote to memory of 2344 1700 Complex Softaim Cracked.exe 41 PID 1700 wrote to memory of 2344 1700 Complex Softaim Cracked.exe 41 PID 1700 wrote to memory of 2344 1700 Complex Softaim Cracked.exe 41 PID 1700 wrote to memory of 1620 1700 Complex Softaim Cracked.exe 43 PID 1700 wrote to memory of 1620 1700 Complex Softaim Cracked.exe 43 PID 1700 wrote to memory of 1620 1700 Complex Softaim Cracked.exe 43 PID 1700 wrote to memory of 1432 1700 Complex Softaim Cracked.exe 45 PID 1700 wrote to memory of 1432 1700 Complex Softaim Cracked.exe 45 PID 1700 wrote to memory of 1432 1700 Complex Softaim Cracked.exe 45 PID 1700 wrote to memory of 1844 1700 Complex Softaim Cracked.exe 47 PID 1700 wrote to memory of 1844 1700 Complex Softaim Cracked.exe 47 PID 1700 wrote to memory of 1844 1700 Complex Softaim Cracked.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\Complex Softaim Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Complex Softaim Cracked.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Complex Softaim Cracked.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:2344
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:1620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50545ce14b271c01f8e8b92d6ab07b298
SHA1f35938707c6749085dcfef817ceaba823fbc81f0
SHA256b13a52383c598d425eacc05d54ddb427274431566b3b897f1d2b94d2a08c4f0a
SHA512763804edbc15da75f5a7b524ee6415496b266d8811eca1c04b4f6a115c33dd2f55016f1df4657004d064889ab9fe94753fecde1c78e4b4d7b24b39247bc5ef34