General
-
Target
FunCheker.zip
-
Size
4.9MB
-
Sample
240720-wczhvawflr
-
MD5
3c9843fb6afb01b0ddd2c880147cb156
-
SHA1
5b889dd2416037fda2e1567357d5757aa9d7fb0f
-
SHA256
416e65650c0e2c368a1de8ec1c39432616ab767bf215d979f614719101e2f890
-
SHA512
f20ebac058c69851a572450d65e3053c06ab9c2c6ad826896ec359cc8d9660544973af8f19c7c01d5b552b644e399a7e3619dde139e880bb5e8708a38a7ddcb6
-
SSDEEP
98304:U85Abi1MPrYXidZ7e9wwwFOX9IxDKekJNYVTC1udTXB8OWetQhZTpyciWIJ:X5AmKPy8ZK9wz/GJGVTC1uXB8feyhZN+
Static task
static1
Behavioral task
behavioral1
Sample
FunCheker.zip
Resource
win10-20240611-en
Malware Config
Extracted
umbral
https://discordapp.com/api/webhooks/1263133479521091615/xsQqcsnMROKJThDjUS6SSW5_NODWCrCjwU7n2qAMIVN8tFELtf3_ISUbQ5EPJJcK86ck
Extracted
xworm
3.0
plus-loves.gl.at.ply.gg:59327
-
Install_directory
%AppData%
-
install_file
USB.exe
Targets
-
-
Target
FunCheker.zip
-
Size
4.9MB
-
MD5
3c9843fb6afb01b0ddd2c880147cb156
-
SHA1
5b889dd2416037fda2e1567357d5757aa9d7fb0f
-
SHA256
416e65650c0e2c368a1de8ec1c39432616ab767bf215d979f614719101e2f890
-
SHA512
f20ebac058c69851a572450d65e3053c06ab9c2c6ad826896ec359cc8d9660544973af8f19c7c01d5b552b644e399a7e3619dde139e880bb5e8708a38a7ddcb6
-
SSDEEP
98304:U85Abi1MPrYXidZ7e9wwwFOX9IxDKekJNYVTC1udTXB8OWetQhZTpyciWIJ:X5AmKPy8ZK9wz/GJGVTC1uXB8feyhZN+
Score1/10 -
-
-
Target
FunCheker.exe
-
Size
4.9MB
-
MD5
ed4e93a8e3e314093fd29c1eec8a215d
-
SHA1
33b3c5588f9c59668c6d1d307de2219d1dd2001b
-
SHA256
484ac7a733ca8a6eaecfe04a9fabe559a44dad80bdfde4ce6cd735d87eccc7cc
-
SHA512
703948850a956f665c64a6f601a3a0ebc5a366da7af6abea53a7d28bc264a8b7d7115ef54cfb5bb229edc2e2d71806580e0356fe74a9b1fe59516a2ab1cce92d
-
SSDEEP
98304:euphkGhwiL8sEHA5Empd+OvwqyNUOT++UDu93CVZnZgSROb5WbOG:17k7oiQEmpg2NSK+ZYA5W
-
Detect Umbral payload
-
Detect Xworm Payload
-
Modifies WinLogon for persistence
-
Modifies security service
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify Tools
1Modify Registry
4Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
2