Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 19:29
Behavioral task
behavioral1
Sample
Twitch Patcheur Setup.exe
Resource
win7-20240705-en
General
-
Target
Twitch Patcheur Setup.exe
-
Size
288KB
-
MD5
2c7d3d4ad2db30f12e3cae6540601762
-
SHA1
7c7464861056574cd273eed99283c0498278ffb9
-
SHA256
0445ee531f81638261d4989a90d2202e117837fc0f992640f26720935fc07fb4
-
SHA512
97b30ef326820cb28dd13a9f7919a330adbc053536c62484258c08f7ff9813fc547a9364e7125a831a798f33ed848c6a29d90312ad43fdeed46e098437375dc1
-
SSDEEP
6144:cloZM+rIkd8g+EtXHkv/iD41Rm89rI8j067NokRvBnb8e1m16oiolUaYmprYHtI:6oZtL+EP81Rm89rI8j067NokRx3oq8pr
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2536-1-0x00000000000C0000-0x000000000010E000-memory.dmp family_umbral -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2996 powershell.exe 548 powershell.exe 2732 powershell.exe 1724 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Twitch Patcheur Setup.exe -
Deletes itself 1 IoCs
pid Process 2528 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2528 cmd.exe 2092 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2316 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2092 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2536 Twitch Patcheur Setup.exe 2996 powershell.exe 548 powershell.exe 2732 powershell.exe 1228 powershell.exe 1724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2536 Twitch Patcheur Setup.exe Token: SeIncreaseQuotaPrivilege 2688 wmic.exe Token: SeSecurityPrivilege 2688 wmic.exe Token: SeTakeOwnershipPrivilege 2688 wmic.exe Token: SeLoadDriverPrivilege 2688 wmic.exe Token: SeSystemProfilePrivilege 2688 wmic.exe Token: SeSystemtimePrivilege 2688 wmic.exe Token: SeProfSingleProcessPrivilege 2688 wmic.exe Token: SeIncBasePriorityPrivilege 2688 wmic.exe Token: SeCreatePagefilePrivilege 2688 wmic.exe Token: SeBackupPrivilege 2688 wmic.exe Token: SeRestorePrivilege 2688 wmic.exe Token: SeShutdownPrivilege 2688 wmic.exe Token: SeDebugPrivilege 2688 wmic.exe Token: SeSystemEnvironmentPrivilege 2688 wmic.exe Token: SeRemoteShutdownPrivilege 2688 wmic.exe Token: SeUndockPrivilege 2688 wmic.exe Token: SeManageVolumePrivilege 2688 wmic.exe Token: 33 2688 wmic.exe Token: 34 2688 wmic.exe Token: 35 2688 wmic.exe Token: SeIncreaseQuotaPrivilege 2688 wmic.exe Token: SeSecurityPrivilege 2688 wmic.exe Token: SeTakeOwnershipPrivilege 2688 wmic.exe Token: SeLoadDriverPrivilege 2688 wmic.exe Token: SeSystemProfilePrivilege 2688 wmic.exe Token: SeSystemtimePrivilege 2688 wmic.exe Token: SeProfSingleProcessPrivilege 2688 wmic.exe Token: SeIncBasePriorityPrivilege 2688 wmic.exe Token: SeCreatePagefilePrivilege 2688 wmic.exe Token: SeBackupPrivilege 2688 wmic.exe Token: SeRestorePrivilege 2688 wmic.exe Token: SeShutdownPrivilege 2688 wmic.exe Token: SeDebugPrivilege 2688 wmic.exe Token: SeSystemEnvironmentPrivilege 2688 wmic.exe Token: SeRemoteShutdownPrivilege 2688 wmic.exe Token: SeUndockPrivilege 2688 wmic.exe Token: SeManageVolumePrivilege 2688 wmic.exe Token: 33 2688 wmic.exe Token: 34 2688 wmic.exe Token: 35 2688 wmic.exe Token: SeDebugPrivilege 2996 powershell.exe Token: SeDebugPrivilege 548 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeIncreaseQuotaPrivilege 2936 wmic.exe Token: SeSecurityPrivilege 2936 wmic.exe Token: SeTakeOwnershipPrivilege 2936 wmic.exe Token: SeLoadDriverPrivilege 2936 wmic.exe Token: SeSystemProfilePrivilege 2936 wmic.exe Token: SeSystemtimePrivilege 2936 wmic.exe Token: SeProfSingleProcessPrivilege 2936 wmic.exe Token: SeIncBasePriorityPrivilege 2936 wmic.exe Token: SeCreatePagefilePrivilege 2936 wmic.exe Token: SeBackupPrivilege 2936 wmic.exe Token: SeRestorePrivilege 2936 wmic.exe Token: SeShutdownPrivilege 2936 wmic.exe Token: SeDebugPrivilege 2936 wmic.exe Token: SeSystemEnvironmentPrivilege 2936 wmic.exe Token: SeRemoteShutdownPrivilege 2936 wmic.exe Token: SeUndockPrivilege 2936 wmic.exe Token: SeManageVolumePrivilege 2936 wmic.exe Token: 33 2936 wmic.exe Token: 34 2936 wmic.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2688 2536 Twitch Patcheur Setup.exe 30 PID 2536 wrote to memory of 2688 2536 Twitch Patcheur Setup.exe 30 PID 2536 wrote to memory of 2688 2536 Twitch Patcheur Setup.exe 30 PID 2536 wrote to memory of 2860 2536 Twitch Patcheur Setup.exe 34 PID 2536 wrote to memory of 2860 2536 Twitch Patcheur Setup.exe 34 PID 2536 wrote to memory of 2860 2536 Twitch Patcheur Setup.exe 34 PID 2536 wrote to memory of 2996 2536 Twitch Patcheur Setup.exe 36 PID 2536 wrote to memory of 2996 2536 Twitch Patcheur Setup.exe 36 PID 2536 wrote to memory of 2996 2536 Twitch Patcheur Setup.exe 36 PID 2536 wrote to memory of 548 2536 Twitch Patcheur Setup.exe 38 PID 2536 wrote to memory of 548 2536 Twitch Patcheur Setup.exe 38 PID 2536 wrote to memory of 548 2536 Twitch Patcheur Setup.exe 38 PID 2536 wrote to memory of 2732 2536 Twitch Patcheur Setup.exe 40 PID 2536 wrote to memory of 2732 2536 Twitch Patcheur Setup.exe 40 PID 2536 wrote to memory of 2732 2536 Twitch Patcheur Setup.exe 40 PID 2536 wrote to memory of 1228 2536 Twitch Patcheur Setup.exe 42 PID 2536 wrote to memory of 1228 2536 Twitch Patcheur Setup.exe 42 PID 2536 wrote to memory of 1228 2536 Twitch Patcheur Setup.exe 42 PID 2536 wrote to memory of 2936 2536 Twitch Patcheur Setup.exe 44 PID 2536 wrote to memory of 2936 2536 Twitch Patcheur Setup.exe 44 PID 2536 wrote to memory of 2936 2536 Twitch Patcheur Setup.exe 44 PID 2536 wrote to memory of 1492 2536 Twitch Patcheur Setup.exe 46 PID 2536 wrote to memory of 1492 2536 Twitch Patcheur Setup.exe 46 PID 2536 wrote to memory of 1492 2536 Twitch Patcheur Setup.exe 46 PID 2536 wrote to memory of 644 2536 Twitch Patcheur Setup.exe 48 PID 2536 wrote to memory of 644 2536 Twitch Patcheur Setup.exe 48 PID 2536 wrote to memory of 644 2536 Twitch Patcheur Setup.exe 48 PID 2536 wrote to memory of 1724 2536 Twitch Patcheur Setup.exe 50 PID 2536 wrote to memory of 1724 2536 Twitch Patcheur Setup.exe 50 PID 2536 wrote to memory of 1724 2536 Twitch Patcheur Setup.exe 50 PID 2536 wrote to memory of 2316 2536 Twitch Patcheur Setup.exe 52 PID 2536 wrote to memory of 2316 2536 Twitch Patcheur Setup.exe 52 PID 2536 wrote to memory of 2316 2536 Twitch Patcheur Setup.exe 52 PID 2536 wrote to memory of 2528 2536 Twitch Patcheur Setup.exe 54 PID 2536 wrote to memory of 2528 2536 Twitch Patcheur Setup.exe 54 PID 2536 wrote to memory of 2528 2536 Twitch Patcheur Setup.exe 54 PID 2528 wrote to memory of 2092 2528 cmd.exe 56 PID 2528 wrote to memory of 2092 2528 cmd.exe 56 PID 2528 wrote to memory of 2092 2528 cmd.exe 56 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2860 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Twitch Patcheur Setup.exe"C:\Users\Admin\AppData\Local\Temp\Twitch Patcheur Setup.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Twitch Patcheur Setup.exe"2⤵
- Views/modifies file attributes
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Twitch Patcheur Setup.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:1492
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:2316
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Twitch Patcheur Setup.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2092
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5bbd20e1c631c4c6fb8314c261d0a8425
SHA1c5a2972ac5298b7980d015e60ad47592b8139350
SHA256b2126a1a4cfce5357f6b30c2ff1d74f69f6cda33014227e1c4c09c67c6064d73
SHA5122fafacaca5d1019f093476165ece26f953417f4bec7725401ff58d5b332bf46f26c424439321f86213a89b947dbf4876ef494c1be6dfe7962f9c13fe80535bd6