Analysis
-
max time kernel
133s -
max time network
135s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25-09-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
RustAnticheat.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
RustAnticheat.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
RustAnticheat.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
RustAnticheat.exe
Resource
win10v2004-20240802-en
General
-
Target
RustAnticheat.exe
-
Size
1.1MB
-
MD5
51d835de66bac2f502ae697a35baec90
-
SHA1
46ed68b3af1160c892090db77dbfd8916128afee
-
SHA256
544a9c11e53d104ee4987900bebeb849490735d2d3a076dd468bcdedd83b6fde
-
SHA512
1be17435d526b464aee3e453295feb831030a4ec9d87c1a4d47eee9b32a3728675fc29ff35143991209e75c5804d02612da31c51dbbad8a6054f03ad01660746
-
SSDEEP
24576:kEKrzjpnzLOtAi9SrsvNOOZT8XYYLvqKaZ2IJhaOtlj:dKr3hL4+yRT3KaIIj
Malware Config
Extracted
xworm
web-amend.gl.at.ply.gg:59501
-
Install_directory
%AppData%
-
install_file
RuntimeBroker.exe
Extracted
umbral
https://discord.com/api/webhooks/1286696205040226395/PlyXt42kMHxkNNkTVcuKXMSs07VdzNAX4G3WkobLmgEeCwny8D96kvYTWDW1AjLuLxBu
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral3/files/0x000800000001ac00-16.dat family_umbral behavioral3/memory/1248-17-0x000002AADD880000-0x000002AADD8C0000-memory.dmp family_umbral -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral3/files/0x000800000001abfd-9.dat family_xworm behavioral3/memory/2924-19-0x0000000000080000-0x0000000000098000-memory.dmp family_xworm -
Executes dropped EXE 3 IoCs
pid Process 4612 Loader (1).exe 2924 RustAnticheat1.exe 1248 Umbral1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader (1).exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 2924 RustAnticheat1.exe Token: SeDebugPrivilege 1248 Umbral1.exe Token: SeIncreaseQuotaPrivilege 5056 wmic.exe Token: SeSecurityPrivilege 5056 wmic.exe Token: SeTakeOwnershipPrivilege 5056 wmic.exe Token: SeLoadDriverPrivilege 5056 wmic.exe Token: SeSystemProfilePrivilege 5056 wmic.exe Token: SeSystemtimePrivilege 5056 wmic.exe Token: SeProfSingleProcessPrivilege 5056 wmic.exe Token: SeIncBasePriorityPrivilege 5056 wmic.exe Token: SeCreatePagefilePrivilege 5056 wmic.exe Token: SeBackupPrivilege 5056 wmic.exe Token: SeRestorePrivilege 5056 wmic.exe Token: SeShutdownPrivilege 5056 wmic.exe Token: SeDebugPrivilege 5056 wmic.exe Token: SeSystemEnvironmentPrivilege 5056 wmic.exe Token: SeRemoteShutdownPrivilege 5056 wmic.exe Token: SeUndockPrivilege 5056 wmic.exe Token: SeManageVolumePrivilege 5056 wmic.exe Token: 33 5056 wmic.exe Token: 34 5056 wmic.exe Token: 35 5056 wmic.exe Token: 36 5056 wmic.exe Token: SeIncreaseQuotaPrivilege 5056 wmic.exe Token: SeSecurityPrivilege 5056 wmic.exe Token: SeTakeOwnershipPrivilege 5056 wmic.exe Token: SeLoadDriverPrivilege 5056 wmic.exe Token: SeSystemProfilePrivilege 5056 wmic.exe Token: SeSystemtimePrivilege 5056 wmic.exe Token: SeProfSingleProcessPrivilege 5056 wmic.exe Token: SeIncBasePriorityPrivilege 5056 wmic.exe Token: SeCreatePagefilePrivilege 5056 wmic.exe Token: SeBackupPrivilege 5056 wmic.exe Token: SeRestorePrivilege 5056 wmic.exe Token: SeShutdownPrivilege 5056 wmic.exe Token: SeDebugPrivilege 5056 wmic.exe Token: SeSystemEnvironmentPrivilege 5056 wmic.exe Token: SeRemoteShutdownPrivilege 5056 wmic.exe Token: SeUndockPrivilege 5056 wmic.exe Token: SeManageVolumePrivilege 5056 wmic.exe Token: 33 5056 wmic.exe Token: 34 5056 wmic.exe Token: 35 5056 wmic.exe Token: 36 5056 wmic.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4472 wrote to memory of 4612 4472 RustAnticheat.exe 75 PID 4472 wrote to memory of 4612 4472 RustAnticheat.exe 75 PID 4472 wrote to memory of 4612 4472 RustAnticheat.exe 75 PID 4472 wrote to memory of 2924 4472 RustAnticheat.exe 76 PID 4472 wrote to memory of 2924 4472 RustAnticheat.exe 76 PID 4472 wrote to memory of 1248 4472 RustAnticheat.exe 77 PID 4472 wrote to memory of 1248 4472 RustAnticheat.exe 77 PID 1248 wrote to memory of 5056 1248 Umbral1.exe 78 PID 1248 wrote to memory of 5056 1248 Umbral1.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\RustAnticheat.exe"C:\Users\Admin\AppData\Local\Temp\RustAnticheat.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Loader (1).exe"C:\Users\Admin\AppData\Local\Loader (1).exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612
-
-
C:\Users\Admin\AppData\Local\RustAnticheat1.exe"C:\Users\Admin\AppData\Local\RustAnticheat1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Users\Admin\AppData\Local\Umbral1.exe"C:\Users\Admin\AppData\Local\Umbral1.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
827KB
MD5eefb801774c5ccb44153268a9357f5f1
SHA1b1906b22e14edd142c52808ab3e5ba9346b85de5
SHA256677aeb1981c58cba41a5d53ccbbf5b471e62dc49dc326570767da940560d840d
SHA5121cf162fe6184d68dca514059d2de1123e80d0faac401765a54224aa5a987c9454bc92263fbec566835aa7b402f1f63ba59bb425ccc139e0a7391e66991f270b7
-
Filesize
67KB
MD5e2380436ed8f81ca925783cfd4ec2be2
SHA1da7f9a44014fd130cf7bdb9e19d9605246e8cfca
SHA2564c1be445457b188ef0aad364ee879505e4b925ddba5405801b0e27af659c806a
SHA51244a57c5e5811d1d840f2cecc1fb5836ad43c7be80061d0b6e800431bf323fd87eef296ee364d87a2fd88502334b657c12bc001c1f2777ad71fca95bce84b6305
-
Filesize
231KB
MD5844f85b3c38478161c8918e2d23a4835
SHA1d2da62e3f0c50ddb3cc510af88368143790d59b9
SHA2568f3ba7ae0aea1ad543fd98a1cb574bada9d363d476e12ae7a332ea83967883b5
SHA51296d4ccdd853a7f878d0409f4f39f4f8fdd6bdf7d086ccd665e8f9141cf9ebc2916d079838e599c67c86cddfd02262c14cee434622821a8550c0dbd87535c95c7