Overview
overview
10Static
static
10GeoLocate ...id.exe
windows7-x64
10GeoLocate ...id.exe
windows10-2004-x64
10GeoLocate ...te.exe
windows7-x64
3GeoLocate ...te.exe
windows10-2004-x64
3GeoLocate ...on.dll
windows7-x64
1GeoLocate ...on.dll
windows10-2004-x64
1GeoLocate ...rt.bat
windows7-x64
10GeoLocate ...rt.bat
windows10-2004-x64
10Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 21:44
Behavioral task
behavioral1
Sample
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
GeoLocate (1)/GeoLocate/Src/Files/skid.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
GeoLocate (1)/GeoLocate/Src/GeoLocate.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
GeoLocate (1)/GeoLocate/Src/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
GeoLocate (1)/GeoLocate/Start.bat
Resource
win7-20240708-en
General
-
Target
GeoLocate (1)/GeoLocate/Start.bat
-
Size
65B
-
MD5
35fe1bc3ce269544b91a4f9d224627c6
-
SHA1
6c84b83ed36f95b805687e5c500e44faf0d144db
-
SHA256
6ed72f86689c84cc2f2680a99d47dd92a4dc9941ff483530814148a587e729c7
-
SHA512
aa72112556953f27f84e1b97de54574776a5043e924caf0935fac3db4c0c6a13db4a85467f7df0755667860b591ae50252358e72374a766a93a18ecfb3ec1403
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral8/memory/920-0-0x0000024579550000-0x0000024579590000-memory.dmp family_umbral -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GeoLocate.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 920 skid.exe Token: SeIncreaseQuotaPrivilege 1052 wmic.exe Token: SeSecurityPrivilege 1052 wmic.exe Token: SeTakeOwnershipPrivilege 1052 wmic.exe Token: SeLoadDriverPrivilege 1052 wmic.exe Token: SeSystemProfilePrivilege 1052 wmic.exe Token: SeSystemtimePrivilege 1052 wmic.exe Token: SeProfSingleProcessPrivilege 1052 wmic.exe Token: SeIncBasePriorityPrivilege 1052 wmic.exe Token: SeCreatePagefilePrivilege 1052 wmic.exe Token: SeBackupPrivilege 1052 wmic.exe Token: SeRestorePrivilege 1052 wmic.exe Token: SeShutdownPrivilege 1052 wmic.exe Token: SeDebugPrivilege 1052 wmic.exe Token: SeSystemEnvironmentPrivilege 1052 wmic.exe Token: SeRemoteShutdownPrivilege 1052 wmic.exe Token: SeUndockPrivilege 1052 wmic.exe Token: SeManageVolumePrivilege 1052 wmic.exe Token: 33 1052 wmic.exe Token: 34 1052 wmic.exe Token: 35 1052 wmic.exe Token: 36 1052 wmic.exe Token: SeIncreaseQuotaPrivilege 1052 wmic.exe Token: SeSecurityPrivilege 1052 wmic.exe Token: SeTakeOwnershipPrivilege 1052 wmic.exe Token: SeLoadDriverPrivilege 1052 wmic.exe Token: SeSystemProfilePrivilege 1052 wmic.exe Token: SeSystemtimePrivilege 1052 wmic.exe Token: SeProfSingleProcessPrivilege 1052 wmic.exe Token: SeIncBasePriorityPrivilege 1052 wmic.exe Token: SeCreatePagefilePrivilege 1052 wmic.exe Token: SeBackupPrivilege 1052 wmic.exe Token: SeRestorePrivilege 1052 wmic.exe Token: SeShutdownPrivilege 1052 wmic.exe Token: SeDebugPrivilege 1052 wmic.exe Token: SeSystemEnvironmentPrivilege 1052 wmic.exe Token: SeRemoteShutdownPrivilege 1052 wmic.exe Token: SeUndockPrivilege 1052 wmic.exe Token: SeManageVolumePrivilege 1052 wmic.exe Token: 33 1052 wmic.exe Token: 34 1052 wmic.exe Token: 35 1052 wmic.exe Token: 36 1052 wmic.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4836 4660 cmd.exe 84 PID 4660 wrote to memory of 4836 4660 cmd.exe 84 PID 4660 wrote to memory of 4836 4660 cmd.exe 84 PID 4660 wrote to memory of 920 4660 cmd.exe 85 PID 4660 wrote to memory of 920 4660 cmd.exe 85 PID 920 wrote to memory of 1052 920 skid.exe 88 PID 920 wrote to memory of 1052 920 skid.exe 88
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GeoLocate (1)\GeoLocate\Start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\GeoLocate (1)\GeoLocate\Src\GeoLocate.exeSrc/GeoLocate.exe2⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
C:\Users\Admin\AppData\Local\Temp\GeoLocate (1)\GeoLocate\Src\Files\skid.exeSrc/Files/skid.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-