Overview
overview
10Static
static
10Primordial...ix.bat
windows10-1703-x64
1Primordial...GL.dll
windows10-1703-x64
3Primordial...v2.dll
windows10-1703-x64
3Primordial...et.dll
windows10-1703-x64
3Primordial...nt.dll
windows10-1703-x64
3Primordial..._1.dll
windows10-1703-x64
3Primordial...32.dll
windows10-1703-x64
3Primordial...-1.dll
windows10-1703-x64
3Primordial...-1.dll
windows10-1703-x64
1Primordial..._1.dll
windows10-1703-x64
3Primordial...-6.dll
windows10-1703-x64
3Primordial...-1.dll
windows10-1703-x64
3Primordial...sw.dll
windows10-1703-x64
3Primordial...in.dll
windows10-1703-x64
3Primordial...ix.dll
windows10-1703-x64
1Primordial...al.exe
windows10-1703-x64
10Primordial...or.dll
windows10-1703-x64
1Analysis
-
max time kernel
15s -
max time network
21s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
15-10-2024 00:23
Behavioral task
behavioral1
Sample
Primordial/FIX/fix.bat
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Primordial/FIX/libEGL.dll
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Primordial/FIX/libGLESv2.dll
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
Primordial/FIX/libQt-Secret.dll
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
Primordial/FIX/libQtBigint.dll
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
Primordial/FIX/libcrypto-1_1.dll
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
Primordial/FIX/libeay32.dll
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
Primordial/FIX/libgcc_s_dw2-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral9
Sample
Primordial/FIX/libgcc_s_seh-1.dll
Resource
win10-20240611-en
Behavioral task
behavioral10
Sample
Primordial/FIX/libssl-1_1.dll
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
Primordial/FIX/libstdc++-6.dll
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
Primordial/FIX/libwinpthread-1.dll
Resource
win10-20240404-en
Behavioral task
behavioral13
Sample
Primordial/FIX/opengl32sw.dll
Resource
win10-20240404-en
Behavioral task
behavioral14
Sample
Primordial/FIX/qtquick2plugin.dll
Resource
win10-20240404-en
Behavioral task
behavioral15
Sample
Primordial/FIX/steamfix.dll
Resource
win10-20240404-en
Behavioral task
behavioral16
Sample
Primordial/Primordial.exe
Resource
win10-20240611-en
Behavioral task
behavioral17
Sample
Primordial/injector.dll
Resource
win10-20240404-en
General
-
Target
Primordial/Primordial.exe
-
Size
231KB
-
MD5
2a9d5da0bb69d53e1b68178bc63e9390
-
SHA1
b1170f7ca36ea613188a272dc8ff8720a586de3a
-
SHA256
b575e722311556b67bc4f2ff77470063e5453e8f9952ddcd33afec9bdefc3902
-
SHA512
372288f96c8d39cba9529e7c44ce4b083eddf50dc3c3317b7b97c02d07018cdc2e0913da3e8309d548f80d68c95b9dd65e4febd4d7ca3b4d6a8df3360cf6aca3
-
SSDEEP
6144:RloZM+rIkd8g+EtXHkv/iD4ZvHYe5xypXKYZd8ZC6lY8e1mGi:joZtL+EP8pHYe5xypXKYZd8dk2
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
Processes:
resource yara_rule behavioral16/memory/3280-1-0x0000023F5A5F0000-0x0000023F5A630000-memory.dmp family_umbral -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
Primordial.exewmic.exedescription pid process Token: SeDebugPrivilege 3280 Primordial.exe Token: SeIncreaseQuotaPrivilege 4160 wmic.exe Token: SeSecurityPrivilege 4160 wmic.exe Token: SeTakeOwnershipPrivilege 4160 wmic.exe Token: SeLoadDriverPrivilege 4160 wmic.exe Token: SeSystemProfilePrivilege 4160 wmic.exe Token: SeSystemtimePrivilege 4160 wmic.exe Token: SeProfSingleProcessPrivilege 4160 wmic.exe Token: SeIncBasePriorityPrivilege 4160 wmic.exe Token: SeCreatePagefilePrivilege 4160 wmic.exe Token: SeBackupPrivilege 4160 wmic.exe Token: SeRestorePrivilege 4160 wmic.exe Token: SeShutdownPrivilege 4160 wmic.exe Token: SeDebugPrivilege 4160 wmic.exe Token: SeSystemEnvironmentPrivilege 4160 wmic.exe Token: SeRemoteShutdownPrivilege 4160 wmic.exe Token: SeUndockPrivilege 4160 wmic.exe Token: SeManageVolumePrivilege 4160 wmic.exe Token: 33 4160 wmic.exe Token: 34 4160 wmic.exe Token: 35 4160 wmic.exe Token: 36 4160 wmic.exe Token: SeIncreaseQuotaPrivilege 4160 wmic.exe Token: SeSecurityPrivilege 4160 wmic.exe Token: SeTakeOwnershipPrivilege 4160 wmic.exe Token: SeLoadDriverPrivilege 4160 wmic.exe Token: SeSystemProfilePrivilege 4160 wmic.exe Token: SeSystemtimePrivilege 4160 wmic.exe Token: SeProfSingleProcessPrivilege 4160 wmic.exe Token: SeIncBasePriorityPrivilege 4160 wmic.exe Token: SeCreatePagefilePrivilege 4160 wmic.exe Token: SeBackupPrivilege 4160 wmic.exe Token: SeRestorePrivilege 4160 wmic.exe Token: SeShutdownPrivilege 4160 wmic.exe Token: SeDebugPrivilege 4160 wmic.exe Token: SeSystemEnvironmentPrivilege 4160 wmic.exe Token: SeRemoteShutdownPrivilege 4160 wmic.exe Token: SeUndockPrivilege 4160 wmic.exe Token: SeManageVolumePrivilege 4160 wmic.exe Token: 33 4160 wmic.exe Token: 34 4160 wmic.exe Token: 35 4160 wmic.exe Token: 36 4160 wmic.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Primordial.exedescription pid process target process PID 3280 wrote to memory of 4160 3280 Primordial.exe wmic.exe PID 3280 wrote to memory of 4160 3280 Primordial.exe wmic.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Primordial\Primordial.exe"C:\Users\Admin\AppData\Local\Temp\Primordial\Primordial.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4160
-