Overview
overview
10Static
static
10GeoLocate ...id.exe
windows7-x64
10GeoLocate ...id.exe
windows10-2004-x64
10GeoLocate ...te.exe
windows7-x64
3GeoLocate ...te.exe
windows10-2004-x64
3GeoLocate ...on.dll
windows7-x64
1GeoLocate ...on.dll
windows10-2004-x64
1GeoLocate ...rt.bat
windows7-x64
10GeoLocate ...rt.bat
windows10-2004-x64
10Analysis
-
max time kernel
26s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 21:44
Behavioral task
behavioral1
Sample
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
GeoLocate (1)/GeoLocate/Start.bat
Resource
win7-20240708-en
General
-
Target
GeoLocate (1)/GeoLocate/Start.bat
-
Size
65B
-
MD5
35fe1bc3ce269544b91a4f9d224627c6
-
SHA1
6c84b83ed36f95b805687e5c500e44faf0d144db
-
SHA256
6ed72f86689c84cc2f2680a99d47dd92a4dc9941ff483530814148a587e729c7
-
SHA512
aa72112556953f27f84e1b97de54574776a5043e924caf0935fac3db4c0c6a13db4a85467f7df0755667860b591ae50252358e72374a766a93a18ecfb3ec1403
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral7/memory/2888-2-0x0000000000DA0000-0x0000000000DE0000-memory.dmp family_umbral -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GeoLocate.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 1936 GeoLocate.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2888 skid.exe Token: SeIncreaseQuotaPrivilege 2660 wmic.exe Token: SeSecurityPrivilege 2660 wmic.exe Token: SeTakeOwnershipPrivilege 2660 wmic.exe Token: SeLoadDriverPrivilege 2660 wmic.exe Token: SeSystemProfilePrivilege 2660 wmic.exe Token: SeSystemtimePrivilege 2660 wmic.exe Token: SeProfSingleProcessPrivilege 2660 wmic.exe Token: SeIncBasePriorityPrivilege 2660 wmic.exe Token: SeCreatePagefilePrivilege 2660 wmic.exe Token: SeBackupPrivilege 2660 wmic.exe Token: SeRestorePrivilege 2660 wmic.exe Token: SeShutdownPrivilege 2660 wmic.exe Token: SeDebugPrivilege 2660 wmic.exe Token: SeSystemEnvironmentPrivilege 2660 wmic.exe Token: SeRemoteShutdownPrivilege 2660 wmic.exe Token: SeUndockPrivilege 2660 wmic.exe Token: SeManageVolumePrivilege 2660 wmic.exe Token: 33 2660 wmic.exe Token: 34 2660 wmic.exe Token: 35 2660 wmic.exe Token: SeIncreaseQuotaPrivilege 2660 wmic.exe Token: SeSecurityPrivilege 2660 wmic.exe Token: SeTakeOwnershipPrivilege 2660 wmic.exe Token: SeLoadDriverPrivilege 2660 wmic.exe Token: SeSystemProfilePrivilege 2660 wmic.exe Token: SeSystemtimePrivilege 2660 wmic.exe Token: SeProfSingleProcessPrivilege 2660 wmic.exe Token: SeIncBasePriorityPrivilege 2660 wmic.exe Token: SeCreatePagefilePrivilege 2660 wmic.exe Token: SeBackupPrivilege 2660 wmic.exe Token: SeRestorePrivilege 2660 wmic.exe Token: SeShutdownPrivilege 2660 wmic.exe Token: SeDebugPrivilege 2660 wmic.exe Token: SeSystemEnvironmentPrivilege 2660 wmic.exe Token: SeRemoteShutdownPrivilege 2660 wmic.exe Token: SeUndockPrivilege 2660 wmic.exe Token: SeManageVolumePrivilege 2660 wmic.exe Token: 33 2660 wmic.exe Token: 34 2660 wmic.exe Token: 35 2660 wmic.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2852 wrote to memory of 1936 2852 cmd.exe 31 PID 2852 wrote to memory of 1936 2852 cmd.exe 31 PID 2852 wrote to memory of 1936 2852 cmd.exe 31 PID 2852 wrote to memory of 1936 2852 cmd.exe 31 PID 2852 wrote to memory of 2888 2852 cmd.exe 32 PID 2852 wrote to memory of 2888 2852 cmd.exe 32 PID 2852 wrote to memory of 2888 2852 cmd.exe 32 PID 2888 wrote to memory of 2660 2888 skid.exe 34 PID 2888 wrote to memory of 2660 2888 skid.exe 34 PID 2888 wrote to memory of 2660 2888 skid.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\GeoLocate (1)\GeoLocate\Start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\GeoLocate (1)\GeoLocate\Src\GeoLocate.exeSrc/GeoLocate.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
PID:1936
-
-
C:\Users\Admin\AppData\Local\Temp\GeoLocate (1)\GeoLocate\Src\Files\skid.exeSrc/Files/skid.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-