Analysis

  • max time kernel
    133s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    25-09-2024 06:52

General

  • Target

    RustAnticheat.exe

  • Size

    1.1MB

  • MD5

    51d835de66bac2f502ae697a35baec90

  • SHA1

    46ed68b3af1160c892090db77dbfd8916128afee

  • SHA256

    544a9c11e53d104ee4987900bebeb849490735d2d3a076dd468bcdedd83b6fde

  • SHA512

    1be17435d526b464aee3e453295feb831030a4ec9d87c1a4d47eee9b32a3728675fc29ff35143991209e75c5804d02612da31c51dbbad8a6054f03ad01660746

  • SSDEEP

    24576:kEKrzjpnzLOtAi9SrsvNOOZT8XYYLvqKaZ2IJhaOtlj:dKr3hL4+yRT3KaIIj

Malware Config

Extracted

Family

xworm

C2

web-amend.gl.at.ply.gg:59501

Attributes
  • Install_directory

    %AppData%

  • install_file

    RuntimeBroker.exe

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1286696205040226395/PlyXt42kMHxkNNkTVcuKXMSs07VdzNAX4G3WkobLmgEeCwny8D96kvYTWDW1AjLuLxBu

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Executes dropped EXE 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RustAnticheat.exe
    "C:\Users\Admin\AppData\Local\Temp\RustAnticheat.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4472
    • C:\Users\Admin\AppData\Local\Loader (1).exe
      "C:\Users\Admin\AppData\Local\Loader (1).exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4612
    • C:\Users\Admin\AppData\Local\RustAnticheat1.exe
      "C:\Users\Admin\AppData\Local\RustAnticheat1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2924
    • C:\Users\Admin\AppData\Local\Umbral1.exe
      "C:\Users\Admin\AppData\Local\Umbral1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:5056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Loader (1).exe

    Filesize

    827KB

    MD5

    eefb801774c5ccb44153268a9357f5f1

    SHA1

    b1906b22e14edd142c52808ab3e5ba9346b85de5

    SHA256

    677aeb1981c58cba41a5d53ccbbf5b471e62dc49dc326570767da940560d840d

    SHA512

    1cf162fe6184d68dca514059d2de1123e80d0faac401765a54224aa5a987c9454bc92263fbec566835aa7b402f1f63ba59bb425ccc139e0a7391e66991f270b7

  • C:\Users\Admin\AppData\Local\RustAnticheat1.exe

    Filesize

    67KB

    MD5

    e2380436ed8f81ca925783cfd4ec2be2

    SHA1

    da7f9a44014fd130cf7bdb9e19d9605246e8cfca

    SHA256

    4c1be445457b188ef0aad364ee879505e4b925ddba5405801b0e27af659c806a

    SHA512

    44a57c5e5811d1d840f2cecc1fb5836ad43c7be80061d0b6e800431bf323fd87eef296ee364d87a2fd88502334b657c12bc001c1f2777ad71fca95bce84b6305

  • C:\Users\Admin\AppData\Local\Umbral1.exe

    Filesize

    231KB

    MD5

    844f85b3c38478161c8918e2d23a4835

    SHA1

    d2da62e3f0c50ddb3cc510af88368143790d59b9

    SHA256

    8f3ba7ae0aea1ad543fd98a1cb574bada9d363d476e12ae7a332ea83967883b5

    SHA512

    96d4ccdd853a7f878d0409f4f39f4f8fdd6bdf7d086ccd665e8f9141cf9ebc2916d079838e599c67c86cddfd02262c14cee434622821a8550c0dbd87535c95c7

  • memory/1248-22-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

    Filesize

    9.9MB

  • memory/1248-17-0x000002AADD880000-0x000002AADD8C0000-memory.dmp

    Filesize

    256KB

  • memory/1248-25-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

    Filesize

    9.9MB

  • memory/2924-19-0x0000000000080000-0x0000000000098000-memory.dmp

    Filesize

    96KB

  • memory/2924-21-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

    Filesize

    9.9MB

  • memory/2924-27-0x00007FFB06770000-0x00007FFB0715C000-memory.dmp

    Filesize

    9.9MB

  • memory/4472-1-0x0000000000920000-0x0000000000A42000-memory.dmp

    Filesize

    1.1MB

  • memory/4472-0-0x00007FFB06773000-0x00007FFB06774000-memory.dmp

    Filesize

    4KB

  • memory/4612-20-0x00000000009A0000-0x0000000000A76000-memory.dmp

    Filesize

    856KB

  • memory/4612-26-0x0000000008E90000-0x0000000008EC8000-memory.dmp

    Filesize

    224KB