Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 11:42

General

  • Target

    bruteforcer.exe

  • Size

    231KB

  • MD5

    1e2b102dcdabbee48cd1308fba1f6719

  • SHA1

    b657cdb68bb499c81f3746965ce63db8b8da7017

  • SHA256

    27fddb3ad83e8139d32ec09c8d6790b0ddd177c2e90f84f104c64010f91e4401

  • SHA512

    7e46052ca1abddd8fc993034cca84fe5d0752629d571a1dd4292a97c6c2a56906a20b7a910d3519ef875dfc1864333d01a8e223c9f18fa7fedf78dd9cdc5408d

  • SSDEEP

    6144:sloZML9EBw/S6NtFnEPfCJxg8JhAA1HM0ryurdEwZThANnp8e1mGRw:qoZhYS6NZLg8JhAA1HM0ryurdEwZTh8C

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bruteforcer.exe
    "C:\Users\Admin\AppData\Local\Temp\bruteforcer.exe"
    1⤵
    • Drops file in Drivers directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1420
    • C:\Windows\SYSTEM32\attrib.exe
      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\bruteforcer.exe"
      2⤵
      • Views/modifies file attributes
      PID:1828
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\bruteforcer.exe'
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2596
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:872
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2264
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d85ba6ff808d9e5444a4b369f5bc2730

    SHA1

    31aa9d96590fff6981b315e0b391b575e4c0804a

    SHA256

    84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

    SHA512

    8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    944B

    MD5

    5a1eeec361ba5d0671ba459c85a6e1d7

    SHA1

    a51cdcd13a6b13e842a2ee977f6d1091d63d706f

    SHA256

    8804fca07f0a87233d848fc260b92e03567ecbee6f903fa0594cb78b11730174

    SHA512

    c41e69d0485c031e49d2505bf531579134147d983d19c3d7d5e3c8f7f6eea5441c830c3eda0f396b54737f30157c9543b68901a79e919ab9f6cc93e6beea345e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    948B

    MD5

    c65738617888921a153bd9b1ef516ee7

    SHA1

    5245e71ea3c181d76320c857b639272ac9e079b1

    SHA256

    4640ba4001fd16a593315299cbdd4988dc2c7075820687f1018aac40aca95c26

    SHA512

    2e2a0ebd93f9d8dd07a7599054bce232683e9add9a35e77b584618040bcfd84a42545352519ec4736cc379002210b6f3ed2d905591c6925c0981b0392b495bfa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    88be3bc8a7f90e3953298c0fdbec4d72

    SHA1

    f4969784ad421cc80ef45608727aacd0f6bf2e4b

    SHA256

    533c8470b41084e40c5660569ebbdb7496520d449629a235e8053e84025f348a

    SHA512

    4fce64e2dacddbc03314048fef1ce356ee2647c14733da121c23c65507eeb8d721d6b690ad5463319b364dc4fa95904ad6ab096907f32918e3406ef438a6ef7c

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ute3bmxe.ox2.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2596-4-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB

  • memory/2596-14-0x0000016469130000-0x0000016469152000-memory.dmp

    Filesize

    136KB

  • memory/2596-15-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB

  • memory/2596-18-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB

  • memory/2596-3-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB

  • memory/4184-34-0x000001EACE9A0000-0x000001EACE9F0000-memory.dmp

    Filesize

    320KB

  • memory/4184-33-0x000001EAE7330000-0x000001EAE73A6000-memory.dmp

    Filesize

    472KB

  • memory/4184-2-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB

  • memory/4184-35-0x000001EACE960000-0x000001EACE97E000-memory.dmp

    Filesize

    120KB

  • memory/4184-1-0x000001EACCB70000-0x000001EACCBB0000-memory.dmp

    Filesize

    256KB

  • memory/4184-0-0x00007FFAF6973000-0x00007FFAF6975000-memory.dmp

    Filesize

    8KB

  • memory/4184-71-0x000001EACE940000-0x000001EACE94A000-memory.dmp

    Filesize

    40KB

  • memory/4184-72-0x000001EACE9F0000-0x000001EACEA02000-memory.dmp

    Filesize

    72KB

  • memory/4184-75-0x00007FFAF6973000-0x00007FFAF6975000-memory.dmp

    Filesize

    8KB

  • memory/4184-76-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB

  • memory/4184-77-0x00007FFAF6970000-0x00007FFAF7431000-memory.dmp

    Filesize

    10.8MB