Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2024, 15:07 UTC

General

  • Target

    5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe

  • Size

    229KB

  • MD5

    eabe2a81aa3dabab25e49ee4b36ce075

  • SHA1

    f55b6298f0a8330d90d39e20a73adb2e828dfd1c

  • SHA256

    5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686

  • SHA512

    9688119150d3a466d9a12bfc55933d367104747a2cf319467a78dfcf975361c9e2727f76efe380db9d0c92c39dc4b0241bfb444e965e92720c9edcf42c1d18fe

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4Wn0IZHMgPou35EwFyov28e1mpi:noZtL+EP8Wn0IZHMgPou35EwFm1

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
    "C:\Users\Admin\AppData\Local\Temp\5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2780
    • C:\Windows\system32\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe"
      2⤵
      • Views/modifies file attributes
      PID:1016
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:608
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2028
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1660
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2192
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" os get Caption
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:568
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" computersystem get totalphysicalmemory
      2⤵
        PID:1008
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        2⤵
          PID:1112
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:556
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          2⤵
          • Detects videocard installed
          PID:1688
        • C:\Windows\system32\cmd.exe
          "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe" && pause
          2⤵
          • Deletes itself
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:1992
          • C:\Windows\system32\PING.EXE
            ping localhost
            3⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2364

      Network

      • flag-us
        DNS
        gstatic.com
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        8.8.8.8:53
        Request
        gstatic.com
        IN A
        Response
        gstatic.com
        IN A
        172.217.16.227
      • flag-gb
        GET
        https://gstatic.com/generate_204
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        172.217.16.227:443
        Request
        GET /generate_204 HTTP/1.1
        Host: gstatic.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 204 No Content
        Content-Length: 0
        Cross-Origin-Resource-Policy: cross-origin
        Date: Wed, 28 Aug 2024 15:07:15 GMT
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      • flag-gb
        GET
        https://gstatic.com/generate_204
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        172.217.16.227:443
        Request
        GET /generate_204 HTTP/1.1
        Host: gstatic.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 204 No Content
        Content-Length: 0
        Cross-Origin-Resource-Policy: cross-origin
        Date: Wed, 28 Aug 2024 15:08:14 GMT
        Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
      • flag-us
        DNS
        ip-api.com
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
        Response
        ip-api.com
        IN A
        208.95.112.1
      • flag-us
        DNS
        ip-api.com
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        8.8.8.8:53
        Request
        ip-api.com
        IN A
      • flag-us
        GET
        http://ip-api.com/line/?fields=hosting
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /line/?fields=hosting HTTP/1.1
        Host: ip-api.com
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Wed, 28 Aug 2024 15:08:15 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 6
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-us
        GET
        http://ip-api.com/json/?fields=225545
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        208.95.112.1:80
        Request
        GET /json/?fields=225545 HTTP/1.1
        Host: ip-api.com
        Response
        HTTP/1.1 200 OK
        Date: Wed, 28 Aug 2024 15:08:18 GMT
        Content-Type: application/json; charset=utf-8
        Content-Length: 161
        Access-Control-Allow-Origin: *
        X-Ttl: 60
        X-Rl: 44
      • flag-us
        DNS
        discord.com
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        8.8.8.8:53
        Request
        discord.com
        IN A
        Response
        discord.com
        IN A
        162.159.138.232
        discord.com
        IN A
        162.159.135.232
        discord.com
        IN A
        162.159.136.232
        discord.com
        IN A
        162.159.137.232
        discord.com
        IN A
        162.159.128.233
      • flag-us
        DNS
        discord.com
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        Remote address:
        8.8.8.8:53
        Request
        discord.com
        IN A
      • 172.217.16.227:443
        https://gstatic.com/generate_204
        tls, http
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        1.4kB
        4.8kB
        15
        10

        HTTP Request

        GET https://gstatic.com/generate_204

        HTTP Response

        204
      • 172.217.16.227:443
        https://gstatic.com/generate_204
        tls, http
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        717 B
        825 B
        9
        6

        HTTP Request

        GET https://gstatic.com/generate_204

        HTTP Response

        204
      • 208.95.112.1:80
        http://ip-api.com/line/?fields=hosting
        http
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        310 B
        267 B
        5
        2

        HTTP Request

        GET http://ip-api.com/line/?fields=hosting

        HTTP Response

        200
      • 208.95.112.1:80
        http://ip-api.com/json/?fields=225545
        http
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        285 B
        510 B
        5
        4

        HTTP Request

        GET http://ip-api.com/json/?fields=225545

        HTTP Response

        200
      • 162.159.138.232:443
        discord.com
        tls
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        483 B
        259 B
        8
        6
      • 8.8.8.8:53
        gstatic.com
        dns
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        57 B
        73 B
        1
        1

        DNS Request

        gstatic.com

        DNS Response

        172.217.16.227

      • 8.8.8.8:53
        ip-api.com
        dns
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        112 B
        72 B
        2
        1

        DNS Request

        ip-api.com

        DNS Request

        ip-api.com

        DNS Response

        208.95.112.1

      • 8.8.8.8:53
        discord.com
        dns
        5b97b5644019cec44dded172780f30b049b82c8e8582a589ce95d7dec421a686.exe
        114 B
        137 B
        2
        1

        DNS Request

        discord.com

        DNS Request

        discord.com

        DNS Response

        162.159.138.232
        162.159.135.232
        162.159.136.232
        162.159.137.232
        162.159.128.233

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        ff255f51e7d29654133f354a9d6be26e

        SHA1

        3e4c59c681cedaaa12c04e804f9338eaa61240e4

        SHA256

        5a1fa01cafea8a8fd19e3d0f0258dcf28b291ca9ad6137fafa74a041bc5700f8

        SHA512

        bb9d87f6edddcf7c579daf908c3a82e69c95b6bc0da9ccd09e2153a8a5ef57dbef8ebc484bedb45eaa515e77f11b9c177b36c078ba73d348bf7dba10547f010d

      • memory/556-45-0x0000000001E80000-0x0000000001E88000-memory.dmp

        Filesize

        32KB

      • memory/608-9-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

        Filesize

        2.9MB

      • memory/608-10-0x0000000001E80000-0x0000000001E88000-memory.dmp

        Filesize

        32KB

      • memory/2028-17-0x0000000002860000-0x0000000002868000-memory.dmp

        Filesize

        32KB

      • memory/2028-16-0x000000001B750000-0x000000001BA32000-memory.dmp

        Filesize

        2.9MB

      • memory/2520-4-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

        Filesize

        9.9MB

      • memory/2520-3-0x000007FEF6113000-0x000007FEF6114000-memory.dmp

        Filesize

        4KB

      • memory/2520-0-0x000007FEF6113000-0x000007FEF6114000-memory.dmp

        Filesize

        4KB

      • memory/2520-2-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

        Filesize

        9.9MB

      • memory/2520-1-0x0000000000EC0000-0x0000000000F00000-memory.dmp

        Filesize

        256KB

      • memory/2520-49-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

        Filesize

        9.9MB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.