Analysis
-
max time kernel
94s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 13:11
Static task
static1
General
-
Target
thegreatestexploits_services.exe
-
Size
1.2MB
-
MD5
aaaf987d8a27c805d177c6063b645be0
-
SHA1
64eda37efbbbc0cbedcd33f1594223d96d5b9803
-
SHA256
d864686dd77c81f89803fe21bc596b9188fd2b9ade88f618d60206a9e167953d
-
SHA512
5126f43fcf8e5f5f62f701b4575d7fd3dfc046614b0889d8dc73631ff876d5998d3f5994743847282270cfa20ba7911d206a41cba3e7327eb017f3fdbe9eefa3
-
SSDEEP
24576:UxRQjzTD/YM9mIqvJlk0/sFR1TbtXwiSwVizX5C1Wmmrj:YRYzTRMYT5btawQNCXmr
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1265015414048428153/VWNDpNZhZlKVwrtnGdcffRijkAKSf8EgngZwE8gCRJ90aR_H6BmlLSPeh2FFEO31-nto
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/3928-2-0x0000000000290000-0x0000000000700000-memory.dmp family_umbral behavioral1/memory/3928-134-0x0000000000290000-0x0000000000700000-memory.dmp family_umbral -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
pid Process 1576 powershell.exe 3200 powershell.exe 2976 powershell.exe 4876 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts thegreatestexploits_services.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 36 discord.com 37 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3928 thegreatestexploits_services.exe 3928 thegreatestexploits_services.exe 3928 thegreatestexploits_services.exe 3928 thegreatestexploits_services.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language thegreatestexploits_services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4036 cmd.exe 4108 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2012 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4108 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3928 thegreatestexploits_services.exe 4876 powershell.exe 4876 powershell.exe 1576 powershell.exe 1576 powershell.exe 3200 powershell.exe 3200 powershell.exe 1080 powershell.exe 1080 powershell.exe 1080 powershell.exe 2976 powershell.exe 2976 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3928 thegreatestexploits_services.exe Token: SeIncreaseQuotaPrivilege 3164 wmic.exe Token: SeSecurityPrivilege 3164 wmic.exe Token: SeTakeOwnershipPrivilege 3164 wmic.exe Token: SeLoadDriverPrivilege 3164 wmic.exe Token: SeSystemProfilePrivilege 3164 wmic.exe Token: SeSystemtimePrivilege 3164 wmic.exe Token: SeProfSingleProcessPrivilege 3164 wmic.exe Token: SeIncBasePriorityPrivilege 3164 wmic.exe Token: SeCreatePagefilePrivilege 3164 wmic.exe Token: SeBackupPrivilege 3164 wmic.exe Token: SeRestorePrivilege 3164 wmic.exe Token: SeShutdownPrivilege 3164 wmic.exe Token: SeDebugPrivilege 3164 wmic.exe Token: SeSystemEnvironmentPrivilege 3164 wmic.exe Token: SeRemoteShutdownPrivilege 3164 wmic.exe Token: SeUndockPrivilege 3164 wmic.exe Token: SeManageVolumePrivilege 3164 wmic.exe Token: 33 3164 wmic.exe Token: 34 3164 wmic.exe Token: 35 3164 wmic.exe Token: 36 3164 wmic.exe Token: SeIncreaseQuotaPrivilege 3164 wmic.exe Token: SeSecurityPrivilege 3164 wmic.exe Token: SeTakeOwnershipPrivilege 3164 wmic.exe Token: SeLoadDriverPrivilege 3164 wmic.exe Token: SeSystemProfilePrivilege 3164 wmic.exe Token: SeSystemtimePrivilege 3164 wmic.exe Token: SeProfSingleProcessPrivilege 3164 wmic.exe Token: SeIncBasePriorityPrivilege 3164 wmic.exe Token: SeCreatePagefilePrivilege 3164 wmic.exe Token: SeBackupPrivilege 3164 wmic.exe Token: SeRestorePrivilege 3164 wmic.exe Token: SeShutdownPrivilege 3164 wmic.exe Token: SeDebugPrivilege 3164 wmic.exe Token: SeSystemEnvironmentPrivilege 3164 wmic.exe Token: SeRemoteShutdownPrivilege 3164 wmic.exe Token: SeUndockPrivilege 3164 wmic.exe Token: SeManageVolumePrivilege 3164 wmic.exe Token: 33 3164 wmic.exe Token: 34 3164 wmic.exe Token: 35 3164 wmic.exe Token: 36 3164 wmic.exe Token: SeDebugPrivilege 4876 powershell.exe Token: SeDebugPrivilege 1576 powershell.exe Token: SeDebugPrivilege 3200 powershell.exe Token: SeDebugPrivilege 1080 powershell.exe Token: SeIncreaseQuotaPrivilege 2960 wmic.exe Token: SeSecurityPrivilege 2960 wmic.exe Token: SeTakeOwnershipPrivilege 2960 wmic.exe Token: SeLoadDriverPrivilege 2960 wmic.exe Token: SeSystemProfilePrivilege 2960 wmic.exe Token: SeSystemtimePrivilege 2960 wmic.exe Token: SeProfSingleProcessPrivilege 2960 wmic.exe Token: SeIncBasePriorityPrivilege 2960 wmic.exe Token: SeCreatePagefilePrivilege 2960 wmic.exe Token: SeBackupPrivilege 2960 wmic.exe Token: SeRestorePrivilege 2960 wmic.exe Token: SeShutdownPrivilege 2960 wmic.exe Token: SeDebugPrivilege 2960 wmic.exe Token: SeSystemEnvironmentPrivilege 2960 wmic.exe Token: SeRemoteShutdownPrivilege 2960 wmic.exe Token: SeUndockPrivilege 2960 wmic.exe Token: SeManageVolumePrivilege 2960 wmic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3928 thegreatestexploits_services.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3928 wrote to memory of 3164 3928 thegreatestexploits_services.exe 87 PID 3928 wrote to memory of 3164 3928 thegreatestexploits_services.exe 87 PID 3928 wrote to memory of 3164 3928 thegreatestexploits_services.exe 87 PID 3928 wrote to memory of 2908 3928 thegreatestexploits_services.exe 90 PID 3928 wrote to memory of 2908 3928 thegreatestexploits_services.exe 90 PID 3928 wrote to memory of 2908 3928 thegreatestexploits_services.exe 90 PID 3928 wrote to memory of 4876 3928 thegreatestexploits_services.exe 92 PID 3928 wrote to memory of 4876 3928 thegreatestexploits_services.exe 92 PID 3928 wrote to memory of 4876 3928 thegreatestexploits_services.exe 92 PID 3928 wrote to memory of 1576 3928 thegreatestexploits_services.exe 98 PID 3928 wrote to memory of 1576 3928 thegreatestexploits_services.exe 98 PID 3928 wrote to memory of 1576 3928 thegreatestexploits_services.exe 98 PID 3928 wrote to memory of 3200 3928 thegreatestexploits_services.exe 100 PID 3928 wrote to memory of 3200 3928 thegreatestexploits_services.exe 100 PID 3928 wrote to memory of 3200 3928 thegreatestexploits_services.exe 100 PID 3928 wrote to memory of 1080 3928 thegreatestexploits_services.exe 103 PID 3928 wrote to memory of 1080 3928 thegreatestexploits_services.exe 103 PID 3928 wrote to memory of 1080 3928 thegreatestexploits_services.exe 103 PID 3928 wrote to memory of 2960 3928 thegreatestexploits_services.exe 105 PID 3928 wrote to memory of 2960 3928 thegreatestexploits_services.exe 105 PID 3928 wrote to memory of 2960 3928 thegreatestexploits_services.exe 105 PID 3928 wrote to memory of 4744 3928 thegreatestexploits_services.exe 107 PID 3928 wrote to memory of 4744 3928 thegreatestexploits_services.exe 107 PID 3928 wrote to memory of 4744 3928 thegreatestexploits_services.exe 107 PID 3928 wrote to memory of 4732 3928 thegreatestexploits_services.exe 109 PID 3928 wrote to memory of 4732 3928 thegreatestexploits_services.exe 109 PID 3928 wrote to memory of 4732 3928 thegreatestexploits_services.exe 109 PID 3928 wrote to memory of 2976 3928 thegreatestexploits_services.exe 111 PID 3928 wrote to memory of 2976 3928 thegreatestexploits_services.exe 111 PID 3928 wrote to memory of 2976 3928 thegreatestexploits_services.exe 111 PID 3928 wrote to memory of 2012 3928 thegreatestexploits_services.exe 115 PID 3928 wrote to memory of 2012 3928 thegreatestexploits_services.exe 115 PID 3928 wrote to memory of 2012 3928 thegreatestexploits_services.exe 115 PID 3928 wrote to memory of 4036 3928 thegreatestexploits_services.exe 117 PID 3928 wrote to memory of 4036 3928 thegreatestexploits_services.exe 117 PID 3928 wrote to memory of 4036 3928 thegreatestexploits_services.exe 117 PID 4036 wrote to memory of 4108 4036 cmd.exe 119 PID 4036 wrote to memory of 4108 4036 cmd.exe 119 PID 4036 wrote to memory of 4108 4036 cmd.exe 119 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2908 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\thegreatestexploits_services.exe"C:\Users\Admin\AppData\Local\Temp\thegreatestexploits_services.exe"1⤵
- Drops file in Drivers directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Windows\SysWOW64\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\thegreatestexploits_services.exe"2⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2908
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\thegreatestexploits_services.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2960
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- System Location Discovery: System Language Discovery
PID:4732
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- System Location Discovery: System Language Discovery
- Detects videocard installed
PID:2012
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\thegreatestexploits_services.exe" && pause2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\PING.EXEping localhost3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4108
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5149630e28a4b250a5dd91ede23d2827c
SHA19dfcfe6917c75b80a8dd4f4b040745f14570d408
SHA2566d798bc33f7d401b3dfa091e8fad788479aeb7d8ed40b9e8cff460d7f603a87e
SHA5128e86fa61ac4923679bfce0a1babf6157267f1a505cebdc7e8f42d3fbee0457b856b2c9f37ae381771f6849cb2dae4c77fedd3a60ebb252f54e7c1c539ab80148
-
Filesize
17KB
MD5d9b270687b118f610dd6f23d18019c7a
SHA1a52a5116b0c5e4a1b2300643ec9421989d3e89b0
SHA2560880b8421485d47032f58b42e32e9b812c7a0208b12057a79ee7659a9e5b4aa4
SHA5125f208f204a433fa61a50d78fe26360ab41b182777ae059d3e9947bb42757b521b167403db0132d086b4561ea1750944b7f0026607ce4a4c487282a3f0a0e548f
-
Filesize
18KB
MD52a4258e2febb7b9c3827161ce212801c
SHA1015075f1de72620efd14bfb2133807be5fbda588
SHA256dc248d3fc7cc910bc893c7e9e625a93c18c8e11539643757be5d28fe79dee463
SHA512ab06eefff0252ae59fc21444e9410982df796a7690812ef5ee46c54848e3dec98252c24612c9f6540787a25bbd5d9666d412c7cba0bc4cd46936a3b0b2d21b5a
-
Filesize
15KB
MD518314cdbb0cb26af21819a4b7fb2406e
SHA12642c4ff20456e27d48c9e8c89ab86bf06bc4ceb
SHA2560dce0abba353bf57b746c193b3a1b582d3d24042421943f17222c8ce17c3ae35
SHA512313e2fdcc9c11d6df56267a206d390a45e18d89c6fc1de9fa11a403fd0d936e3e6e259b3b9abac9c9300cbbcd1cefa037ff1b6cd354115fe6dfb9960716de593
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82