Overview
overview
10Static
static
3FATALITY c...TY.exe
windows7-x64
10FATALITY c...TY.exe
windows10-2004-x64
10FATALITY c...it.cfg
windows7-x64
3FATALITY c...it.cfg
windows10-2004-x64
3FATALITY c...ge.cfg
windows7-x64
3FATALITY c...ge.cfg
windows10-2004-x64
3FATALITY c...ck.pdb
windows7-x64
3FATALITY c...ck.pdb
windows10-2004-x64
3FATALITY c...or.dll
windows7-x64
1FATALITY c...or.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
FATALITY crack/FATALITY.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FATALITY crack/FATALITY.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
FATALITY crack/cfg/legit.cfg
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
FATALITY crack/cfg/legit.cfg
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
FATALITY crack/cfg/rage.cfg
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
FATALITY crack/cfg/rage.cfg
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
FATALITY crack/crack.pdb
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
FATALITY crack/crack.pdb
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
FATALITY crack/injector.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
FATALITY crack/injector.dll
Resource
win10v2004-20240709-en
General
-
Target
FATALITY crack/FATALITY.exe
-
Size
2.5MB
-
MD5
4320dae0d20c88ceb6f28b623a916dd2
-
SHA1
c1218c51804a602115462ea8259578fdbb280468
-
SHA256
441d4439cd72a239077d97895571804711356f1e1ded396c229635adf3c80ea4
-
SHA512
ee32e90d021835d608d43d3ee6d2d107fcfb15fa174c179ed4ae7dd47ec0dd45baadd1c73158c73d5e4fd7b89f5925ae505a6df66bb81e9d5693216316622fcf
-
SSDEEP
49152:U14vPsUk84QgsmsQgt/KOQtLvwnQ/7syEL+mZ1TxrYgHZfr2gsNS1zb9cVg1Z2U/:JPtmLgtTGTwQAyY3TdYCsI1zAgb27wh
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1262023513791795210/lh7elYm8P8VO-5cJhytgrq0ctoq8aDKbmp8g53xHgib8khvCb3mkeM8KrmYRaSRrsa45
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x00050000000195c2-12.dat family_umbral behavioral1/memory/2064-23-0x0000000000A80000-0x0000000000AC0000-memory.dmp family_umbral -
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\", \"C:\\PortFontnetCommon\\smss.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\", \"C:\\PortFontnetCommon\\smss.exe\", \"C:\\Windows\\Fonts\\System.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\", \"C:\\PortFontnetCommon\\smss.exe\", \"C:\\Windows\\Fonts\\System.exe\", \"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\", \"C:\\PortFontnetCommon\\smss.exe\", \"C:\\Windows\\Fonts\\System.exe\", \"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\it\\lsass.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\", \"C:\\PortFontnetCommon\\smss.exe\", \"C:\\Windows\\Fonts\\System.exe\", \"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\", \"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\it\\lsass.exe\", \"C:\\PortFontnetCommon\\ComBroker.exe\"" ComBroker.exe -
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1508 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2056 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 276 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2816 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2508 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2920 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2352 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2448 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2240 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2232 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 908 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1484 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1552 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3004 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2696 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 580 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2872 2660 schtasks.exe 34 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2000 2660 schtasks.exe 34 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1804 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral.exe -
Executes dropped EXE 5 IoCs
pid Process 2448 FATALITY.exe 2064 Umbral.exe 2292 Windows Defender.exe 1700 ComBroker.exe 2956 smss.exe -
Loads dropped DLL 5 IoCs
pid Process 1948 FATALITY.exe 1948 FATALITY.exe 1948 FATALITY.exe 2416 cmd.exe 2416 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" ComBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\it\\lsass.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ComBroker = "\"C:\\PortFontnetCommon\\ComBroker.exe\"" ComBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\"" ComBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\PortFontnetCommon\\smss.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\PortFontnetCommon\\smss.exe\"" ComBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\Fonts\\System.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\"C:\\Windows\\Fonts\\System.exe\"" ComBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\WmiPrvSE = "\"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\WmiPrvSE.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lsass = "\"C:\\Program Files\\Reference Assemblies\\Microsoft\\Framework\\v3.0\\it\\lsass.exe\"" ComBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\ComBroker = "\"C:\\PortFontnetCommon\\ComBroker.exe\"" ComBroker.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\audiodg = "\"C:\\Program Files\\MSBuild\\Microsoft\\Windows Workflow Foundation\\v3.0\\audiodg.exe\"" ComBroker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\Windows\System32\CSCB25195FF1C03441F9877AE207685ABDC.TMP csc.exe File created \??\c:\Windows\System32\8wawgv.exe csc.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\lsass.exe ComBroker.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\lsass.exe ComBroker.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\6203df4a6bafc7 ComBroker.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\audiodg.exe ComBroker.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\42af1c969fbb7b ComBroker.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\System.exe ComBroker.exe File created C:\Windows\Fonts\27d1bcfc3c54e0 ComBroker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2096 wmic.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 556 PING.EXE 2276 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3004 schtasks.exe 2508 schtasks.exe 2352 schtasks.exe 2448 schtasks.exe 2240 schtasks.exe 2232 schtasks.exe 1508 schtasks.exe 2056 schtasks.exe 2816 schtasks.exe 2872 schtasks.exe 908 schtasks.exe 1484 schtasks.exe 1552 schtasks.exe 580 schtasks.exe 2000 schtasks.exe 276 schtasks.exe 2920 schtasks.exe 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2064 Umbral.exe 1804 powershell.exe 2884 powershell.exe 3020 powershell.exe 1340 powershell.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe 1700 ComBroker.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2064 Umbral.exe Token: SeIncreaseQuotaPrivilege 1864 wmic.exe Token: SeSecurityPrivilege 1864 wmic.exe Token: SeTakeOwnershipPrivilege 1864 wmic.exe Token: SeLoadDriverPrivilege 1864 wmic.exe Token: SeSystemProfilePrivilege 1864 wmic.exe Token: SeSystemtimePrivilege 1864 wmic.exe Token: SeProfSingleProcessPrivilege 1864 wmic.exe Token: SeIncBasePriorityPrivilege 1864 wmic.exe Token: SeCreatePagefilePrivilege 1864 wmic.exe Token: SeBackupPrivilege 1864 wmic.exe Token: SeRestorePrivilege 1864 wmic.exe Token: SeShutdownPrivilege 1864 wmic.exe Token: SeDebugPrivilege 1864 wmic.exe Token: SeSystemEnvironmentPrivilege 1864 wmic.exe Token: SeRemoteShutdownPrivilege 1864 wmic.exe Token: SeUndockPrivilege 1864 wmic.exe Token: SeManageVolumePrivilege 1864 wmic.exe Token: 33 1864 wmic.exe Token: 34 1864 wmic.exe Token: 35 1864 wmic.exe Token: SeIncreaseQuotaPrivilege 1864 wmic.exe Token: SeSecurityPrivilege 1864 wmic.exe Token: SeTakeOwnershipPrivilege 1864 wmic.exe Token: SeLoadDriverPrivilege 1864 wmic.exe Token: SeSystemProfilePrivilege 1864 wmic.exe Token: SeSystemtimePrivilege 1864 wmic.exe Token: SeProfSingleProcessPrivilege 1864 wmic.exe Token: SeIncBasePriorityPrivilege 1864 wmic.exe Token: SeCreatePagefilePrivilege 1864 wmic.exe Token: SeBackupPrivilege 1864 wmic.exe Token: SeRestorePrivilege 1864 wmic.exe Token: SeShutdownPrivilege 1864 wmic.exe Token: SeDebugPrivilege 1864 wmic.exe Token: SeSystemEnvironmentPrivilege 1864 wmic.exe Token: SeRemoteShutdownPrivilege 1864 wmic.exe Token: SeUndockPrivilege 1864 wmic.exe Token: SeManageVolumePrivilege 1864 wmic.exe Token: 33 1864 wmic.exe Token: 34 1864 wmic.exe Token: 35 1864 wmic.exe Token: SeDebugPrivilege 1804 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe Token: SeDebugPrivilege 3020 powershell.exe Token: SeDebugPrivilege 1340 powershell.exe Token: SeDebugPrivilege 1700 ComBroker.exe Token: SeIncreaseQuotaPrivilege 1144 wmic.exe Token: SeSecurityPrivilege 1144 wmic.exe Token: SeTakeOwnershipPrivilege 1144 wmic.exe Token: SeLoadDriverPrivilege 1144 wmic.exe Token: SeSystemProfilePrivilege 1144 wmic.exe Token: SeSystemtimePrivilege 1144 wmic.exe Token: SeProfSingleProcessPrivilege 1144 wmic.exe Token: SeIncBasePriorityPrivilege 1144 wmic.exe Token: SeCreatePagefilePrivilege 1144 wmic.exe Token: SeBackupPrivilege 1144 wmic.exe Token: SeRestorePrivilege 1144 wmic.exe Token: SeShutdownPrivilege 1144 wmic.exe Token: SeDebugPrivilege 1144 wmic.exe Token: SeSystemEnvironmentPrivilege 1144 wmic.exe Token: SeRemoteShutdownPrivilege 1144 wmic.exe Token: SeUndockPrivilege 1144 wmic.exe Token: SeManageVolumePrivilege 1144 wmic.exe Token: 33 1144 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2448 1948 FATALITY.exe 30 PID 1948 wrote to memory of 2448 1948 FATALITY.exe 30 PID 1948 wrote to memory of 2448 1948 FATALITY.exe 30 PID 1948 wrote to memory of 2448 1948 FATALITY.exe 30 PID 1948 wrote to memory of 2064 1948 FATALITY.exe 31 PID 1948 wrote to memory of 2064 1948 FATALITY.exe 31 PID 1948 wrote to memory of 2064 1948 FATALITY.exe 31 PID 1948 wrote to memory of 2064 1948 FATALITY.exe 31 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 1948 wrote to memory of 2292 1948 FATALITY.exe 32 PID 2448 wrote to memory of 2932 2448 FATALITY.exe 33 PID 2448 wrote to memory of 2932 2448 FATALITY.exe 33 PID 2448 wrote to memory of 2932 2448 FATALITY.exe 33 PID 2448 wrote to memory of 2932 2448 FATALITY.exe 33 PID 2064 wrote to memory of 1864 2064 Umbral.exe 35 PID 2064 wrote to memory of 1864 2064 Umbral.exe 35 PID 2064 wrote to memory of 1864 2064 Umbral.exe 35 PID 2064 wrote to memory of 2232 2064 Umbral.exe 37 PID 2064 wrote to memory of 2232 2064 Umbral.exe 37 PID 2064 wrote to memory of 2232 2064 Umbral.exe 37 PID 2064 wrote to memory of 1804 2064 Umbral.exe 39 PID 2064 wrote to memory of 1804 2064 Umbral.exe 39 PID 2064 wrote to memory of 1804 2064 Umbral.exe 39 PID 2064 wrote to memory of 2884 2064 Umbral.exe 41 PID 2064 wrote to memory of 2884 2064 Umbral.exe 41 PID 2064 wrote to memory of 2884 2064 Umbral.exe 41 PID 2064 wrote to memory of 3020 2064 Umbral.exe 43 PID 2064 wrote to memory of 3020 2064 Umbral.exe 43 PID 2064 wrote to memory of 3020 2064 Umbral.exe 43 PID 2064 wrote to memory of 1340 2064 Umbral.exe 45 PID 2064 wrote to memory of 1340 2064 Umbral.exe 45 PID 2064 wrote to memory of 1340 2064 Umbral.exe 45 PID 2932 wrote to memory of 2416 2932 WScript.exe 47 PID 2932 wrote to memory of 2416 2932 WScript.exe 47 PID 2932 wrote to memory of 2416 2932 WScript.exe 47 PID 2932 wrote to memory of 2416 2932 WScript.exe 47 PID 2416 wrote to memory of 1700 2416 cmd.exe 49 PID 2416 wrote to memory of 1700 2416 cmd.exe 49 PID 2416 wrote to memory of 1700 2416 cmd.exe 49 PID 2416 wrote to memory of 1700 2416 cmd.exe 49 PID 2064 wrote to memory of 1144 2064 Umbral.exe 50 PID 2064 wrote to memory of 1144 2064 Umbral.exe 50 PID 2064 wrote to memory of 1144 2064 Umbral.exe 50 PID 2064 wrote to memory of 1052 2064 Umbral.exe 52 PID 2064 wrote to memory of 1052 2064 Umbral.exe 52 PID 2064 wrote to memory of 1052 2064 Umbral.exe 52 PID 2064 wrote to memory of 2572 2064 Umbral.exe 54 PID 2064 wrote to memory of 2572 2064 Umbral.exe 54 PID 2064 wrote to memory of 2572 2064 Umbral.exe 54 PID 2064 wrote to memory of 1364 2064 Umbral.exe 56 PID 2064 wrote to memory of 1364 2064 Umbral.exe 56 PID 2064 wrote to memory of 1364 2064 Umbral.exe 56 PID 1700 wrote to memory of 304 1700 ComBroker.exe 61 PID 1700 wrote to memory of 304 1700 ComBroker.exe 61 PID 1700 wrote to memory of 304 1700 ComBroker.exe 61 PID 2064 wrote to memory of 2096 2064 Umbral.exe 63 PID 2064 wrote to memory of 2096 2064 Umbral.exe 63 PID 2064 wrote to memory of 2096 2064 Umbral.exe 63 PID 304 wrote to memory of 328 304 csc.exe 65 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2232 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FATALITY crack\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY crack\FATALITY.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"C:\Users\Admin\AppData\Local\Temp\FATALITY.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\PortFontnetCommon\jnh1y.vbe"3⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\PortFontnetCommon\IOEmPpqly1DOIlscl2iPO8G0g.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\PortFontnetCommon\ComBroker.exe"C:\PortFontnetCommon/ComBroker.exe"5⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4vp2qybo\4vp2qybo.cmdline"6⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCA9F.tmp" "c:\Windows\System32\CSCB25195FF1C03441F9877AE207685ABDC.TMP"7⤵PID:328
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Zf5YGXZrWE.bat"6⤵PID:2876
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:264
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- Runs ping.exe
PID:2276
-
-
C:\PortFontnetCommon\smss.exe"C:\PortFontnetCommon\smss.exe"7⤵
- Executes dropped EXE
PID:2956
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"3⤵
- Views/modifies file attributes
PID:2232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:1052
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵PID:1364
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2096
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause3⤵PID:1692
-
C:\Windows\system32\PING.EXEping localhost4⤵
- Runs ping.exe
PID:556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe"C:\Users\Admin\AppData\Local\Temp\Windows Defender.exe"2⤵
- Executes dropped EXE
PID:2292
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 8 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\audiodg.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2056
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "audiodga" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\audiodg.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:276
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 9 /tr "'C:\PortFontnetCommon\smss.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2816
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\PortFontnetCommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2508
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smsss" /sc MINUTE /mo 7 /tr "'C:\PortFontnetCommon\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2920
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Windows\Fonts\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2352
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Windows\Fonts\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2448
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 10 /tr "'C:\Windows\Fonts\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2240
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 8 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2232
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:908
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 7 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\WmiPrvSE.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1484
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1552
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3004
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 6 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2696
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComBrokerC" /sc MINUTE /mo 13 /tr "'C:\PortFontnetCommon\ComBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComBroker" /sc ONLOGON /tr "'C:\PortFontnetCommon\ComBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2872
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "ComBrokerC" /sc MINUTE /mo 14 /tr "'C:\PortFontnetCommon\ComBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2000
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77B
MD58a8897cb275aec7987c9fea337dbb5d7
SHA1cacad156f59892d6070327926560ab0a5fc737da
SHA25641ec477f48bcce425a660de22536aa3b0fde43560f13158e91d00732185d46a6
SHA5120c2e8d66062b525a766545f82cf96808b40b307c2b8e478afd2fc1bb5ea8535a83b0b00bafb10af467bd937513d8713e6672b21955551beb33e62d45984092cc
-
Filesize
220B
MD58bd8bfc27a2ccc45fc9bb7c3908de480
SHA140190bcef75e208709fabdac52efdfea410a6fa9
SHA2560b6cb03c8b7f3adc721771d9b0f2453f7c983851d3621a6a620b8dbd76f9ba43
SHA5122ce7ce7525bde10656c8539d1fb1fcbe3d8db693e05efaf6d24017766d623abd2414e7469df9b2d43aef3e4f24584628b7f0060efa51bbb42b0e9e270e76449a
-
Filesize
1KB
MD51233c440d6d9c3e72aaf51ea07cb728e
SHA1a431ed648c3ec4cae848b939112d3ffe1f74d956
SHA256dd18450f22c872be7942683465131c42c17fb8b44ad92101519db3eb919ccf97
SHA5127d8a2b86ed7d46d51b93c251ab5e15235d4b731463fa15b02daf08dc90357cf881b17b38dc07413eb0ae9e81b5f7903550103c99d889bdd9a3d701341f1bf76e
-
Filesize
227KB
MD5e7452f59f2853220a6db8b98e26a81d1
SHA1730e6e1f5a6ee671b4be097843b08c242ef4e8fb
SHA256a9f45987c45143e6c198ebb530c0df131cf1ce8d6b40f07128d22ed30a698f21
SHA51222ac9f0951e0a7f32012b20335b464eb0b41609f5fbf8bc7ecacfbc3dcad73bfdaeac5695632b9f8005edd2066b2b79a01a743ce04f5847c76e4faff7b1291b0
-
Filesize
490KB
MD5fa3f84d3150dab7b7d8e35efbb8d02db
SHA15b690c0be18426633a1954844f49cee2b1e09cb7
SHA256a42d5a457ee0d90dee5cb5ba969687a83ba5626abf040a2f3ed496f83456c162
SHA512a4dd554461e167c6a272f8ca90bcde729c319a115419b2a8874af34241116afadf9e6a4dec7db5e145f7e5a1d98827f0a50861c862abb89de81c3f4703247f1b
-
Filesize
157B
MD5f7ccae6774d576f2b82e68dc9da0be33
SHA1a54189b2978662bd5451c7af9f37709d5e281e04
SHA2569d4f76b566a687bdae43c3a34e4042ac0194887f55a2acb192e4ebee440fa194
SHA512ec8bd2ced69bbe0bbef792f6103a03c5766b85482017759b29e488c631c842f33a74f4e77275775f6fd48932f44862fa502ff71f2e84de0793c36132d3e201a5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56973d42dd875bfd26666c1eb31c48a51
SHA1c25467f241d2ecfae9ed81503b49b3bb88a20108
SHA2562b3548683b1fab1c6a09dba70f83f1a6a961e014cdaabe59c5394e47bb11a1c2
SHA512fded315361316071e7bf592f933d47e39e0306b9be88b8fbbff48108a4bb983a0045946b860023fccd1c3520e33141791f7012b5fe169b919b4e4452979bd38f
-
Filesize
411B
MD59d4b4cf6659e300822afde132c086ac5
SHA1fa79c73c63a148c377a0109ebbdaf8991d1dd569
SHA2560b995a0fc2f1fc90aaecc057bfbb8f6a498734b48bbb6be9f90600dffb3041fd
SHA5121a029821cc3877a5151454b8f9194f4e075230b9cd454416f4c0407c66772bc2b6876c08ce4136ee51f4276cfc20f0fb441f9fc61cc85e5299387f73bd48136e
-
Filesize
235B
MD5e164f372e66c30482f0e989853307eff
SHA17e03ede7f7b420cccc893c333cc7127180975e7a
SHA25617a188b8c711accc0bc994da26f453bc6b6277454d58ffd63b64a19753fee217
SHA51229794cd7fc8404439f43b3494e6b6eec5086d3a6ea1ce612e25b95c901c9ea46e42ef90b204e8be4abafef982efbe0b8561bdadb4b58eda8e90048e67c25cf47
-
Filesize
1KB
MD5028d4cd290ab6fe13d6fecce144a32cc
SHA1e1d9531cb2e6bc9cab285b1f19e5d627257a3394
SHA2563f42f68eb3df49cf836fbb0019b8206af735e22f3d528e7b122fa9b2541fdde3
SHA5122f99d37a56444831298f8efaef425e5dadec938ac459bfc0cdaf3708ef8662f12bd8d687a58fc1dd6bbdac6c806214b65a21489a24d3160c1e8575968e3caa6e
-
Filesize
2.0MB
MD52af56288ae70824c48341954c6817df4
SHA136a4df878adc348e12ab01d8cee1b730f234158f
SHA25608cd9bdbfd747ca0b60186b1c6d8a27c892cb6e3ee1e7e857302b881e8a6d125
SHA5129469cec69704dccad5c6648af3722c98b2aa3e63ff549b4dd821470c6624e6aee1ddecfc4f4e0feb5f967c8110439b347717f98fc09f8664cef4e4f179199dcb
-
Filesize
2.5MB
MD5835f86f98a133e8bebd227594e9aff76
SHA13ebb6890c3f47ab0c906d958895a0d7db2de13d3
SHA25673354fe6381e7678e3ee478c2c1e8bb21917c8de19e7218e5c4d241345831b29
SHA51289f5a6a28794b4e414a9f95c44cdaf8e1b3998f668214de30716abd75dc32e526fe001aa5294bae5a44ae5e6274493191f3c2da8ba92fac1ab9f421cedecccc4