Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 11:30 UTC

General

  • Target

    f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe

  • Size

    227KB

  • MD5

    57725f9d6fe867414481c9174b761df1

  • SHA1

    498f57a097747aa80a83a2927a74d96c007028c6

  • SHA256

    f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd

  • SHA512

    28de892b39cfb8e534c8bec5c2a8f277adb006499930fc6cf00251b5f157033d856dcb41dbc80375a61dc7ffe9eb109e1e00cbc42972b2202f8348daac7b6586

  • SSDEEP

    6144:+loZM9rIkd8g+EtXHkv/iD4UcHZLxCqVUQhTuOLdG2Hb8e1mB1i:ooZOL+EP8UcHZLxCqVUQhTuOLd9Ec

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
    "C:\Users\Admin\AppData\Local\Temp\f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Windows\system32\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe"
      2⤵
      • Views/modifies file attributes
      PID:2012
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2716
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1556
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2532
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" computersystem get totalphysicalmemory
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2708
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
        PID:2968
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:3020
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic" path win32_VideoController get name
        2⤵
        • Detects videocard installed
        PID:1120
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe" && pause
        2⤵
        • Deletes itself
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:1328
        • C:\Windows\system32\PING.EXE
          ping localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2388

    Network

    • flag-us
      DNS
      gstatic.com
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      Remote address:
      8.8.8.8:53
      Request
      gstatic.com
      IN A
      Response
      gstatic.com
      IN A
      216.58.214.67
    • flag-fr
      GET
      https://gstatic.com/generate_204
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      Remote address:
      216.58.214.67:443
      Request
      GET /generate_204 HTTP/1.1
      Host: gstatic.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 204 No Content
      Content-Length: 0
      Cross-Origin-Resource-Policy: cross-origin
      Date: Wed, 21 Aug 2024 11:30:19 GMT
      Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
    • flag-us
      DNS
      ip-api.com
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      Remote address:
      8.8.8.8:53
      Request
      ip-api.com
      IN A
      Response
      ip-api.com
      IN A
      208.95.112.1
    • flag-us
      GET
      http://ip-api.com/json/?fields=225545
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      Remote address:
      208.95.112.1:80
      Request
      GET /json/?fields=225545 HTTP/1.1
      Host: ip-api.com
      Connection: Keep-Alive
      Response
      HTTP/1.1 200 OK
      Date: Wed, 21 Aug 2024 11:30:22 GMT
      Content-Type: application/json; charset=utf-8
      Content-Length: 161
      Access-Control-Allow-Origin: *
      X-Ttl: 60
      X-Rl: 44
    • flag-us
      DNS
      discord.com
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      Remote address:
      8.8.8.8:53
      Request
      discord.com
      IN A
      Response
      discord.com
      IN A
      162.159.138.232
      discord.com
      IN A
      162.159.128.233
      discord.com
      IN A
      162.159.137.232
      discord.com
      IN A
      162.159.135.232
      discord.com
      IN A
      162.159.136.232
    • flag-us
      DNS
      discord.com
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      Remote address:
      8.8.8.8:53
      Request
      discord.com
      IN A
    • 216.58.214.67:443
      https://gstatic.com/generate_204
      tls, http
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      798 B
      4.8kB
      10
      10

      HTTP Request

      GET https://gstatic.com/generate_204

      HTTP Response

      204
    • 208.95.112.1:80
      http://ip-api.com/json/?fields=225545
      http
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      474 B
      574 B
      7
      5

      HTTP Request

      GET http://ip-api.com/json/?fields=225545

      HTTP Response

      200
    • 162.159.138.232:443
      discord.com
      tls
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      345 B
      219 B
      5
      5
    • 8.8.8.8:53
      gstatic.com
      dns
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      57 B
      73 B
      1
      1

      DNS Request

      gstatic.com

      DNS Response

      216.58.214.67

    • 8.8.8.8:53
      ip-api.com
      dns
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      56 B
      72 B
      1
      1

      DNS Request

      ip-api.com

      DNS Response

      208.95.112.1

    • 8.8.8.8:53
      discord.com
      dns
      f29f169e410ccc847f78e8df47006a45025ba10f0d517629f80ad73995d614fd.exe
      114 B
      137 B
      2
      1

      DNS Request

      discord.com

      DNS Request

      discord.com

      DNS Response

      162.159.138.232
      162.159.128.233
      162.159.137.232
      162.159.135.232
      162.159.136.232

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GWPZX9HR43NCROC1WC1B.temp

      Filesize

      7KB

      MD5

      b0ee26259a46068c6ad54da5982f7d68

      SHA1

      8818e32c8f8d9e722e68558d9e3c01a282ada5a3

      SHA256

      aff877ed53cb30af309dd33d73f0b84be7b356dd6ae6980b45d2d6de0bb2a7b6

      SHA512

      a615ca4d5137c62ce28f8b06560ee07540b1f17e96c3556dc0860c0f514cdcb6bd1e66cdf7013fd2659c1bbbd5db1774248556bb8ed5aa756abd44f68480a395

    • memory/1280-8-0x000000001B650000-0x000000001B932000-memory.dmp

      Filesize

      2.9MB

    • memory/1280-13-0x000007FEEDDC0000-0x000007FEEE75D000-memory.dmp

      Filesize

      9.6MB

    • memory/1280-15-0x000007FEEDDC0000-0x000007FEEE75D000-memory.dmp

      Filesize

      9.6MB

    • memory/1280-10-0x000007FEEDDC0000-0x000007FEEE75D000-memory.dmp

      Filesize

      9.6MB

    • memory/1280-9-0x0000000002860000-0x0000000002868000-memory.dmp

      Filesize

      32KB

    • memory/1280-11-0x000007FEEDDC0000-0x000007FEEE75D000-memory.dmp

      Filesize

      9.6MB

    • memory/1280-12-0x000007FEEDDC0000-0x000007FEEE75D000-memory.dmp

      Filesize

      9.6MB

    • memory/1280-7-0x000007FEEE07E000-0x000007FEEE07F000-memory.dmp

      Filesize

      4KB

    • memory/1280-14-0x000007FEEDDC0000-0x000007FEEE75D000-memory.dmp

      Filesize

      9.6MB

    • memory/2716-22-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

      Filesize

      32KB

    • memory/2716-21-0x000000001B6D0000-0x000000001B9B2000-memory.dmp

      Filesize

      2.9MB

    • memory/2928-0-0x000007FEF5FA3000-0x000007FEF5FA4000-memory.dmp

      Filesize

      4KB

    • memory/2928-2-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

      Filesize

      9.9MB

    • memory/2928-1-0x00000000008A0000-0x00000000008E0000-memory.dmp

      Filesize

      256KB

    • memory/2928-53-0x000007FEF5FA0000-0x000007FEF698C000-memory.dmp

      Filesize

      9.9MB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.