Resubmissions

19-10-2024 11:46

241019-nxh3lawepj 10

19-10-2024 11:42

241019-nvc4kathmg 7

19-10-2024 11:38

241019-nrspvawcnp 10

19-10-2024 11:33

241019-nnzc8atfla 10

19-10-2024 11:27

241019-nkpplswakl 10

19-10-2024 11:23

241019-nhfnxsvhmk 10

19-10-2024 11:11

241019-najevashqf 10

19-10-2024 11:07

241019-m762qssgph 3

Analysis

  • max time kernel
    110s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-10-2024 11:27

General

  • Target

    6812964531.exe

  • Size

    67KB

  • MD5

    7de65122a13ab9d81368ee3dff3cc80a

  • SHA1

    ecbb4db641431d4d672e4b88e8d309419fd32f04

  • SHA256

    a73a05a4b6ec6ae1c1ba6d3d12b68cc52b899e2a6dbbaaa1f48f2c260a733123

  • SHA512

    b156d77a665c3256ddfd016e46105b6e87db6a4c1ca77e9bb25b221c368f3cc53dddc7159602cfb926ef0cc9bacac57b6bd41e7e28998883c996727d58d29401

  • SSDEEP

    1536:pr3rob4nqB6veqHnq+Pgm5NN9vbDTc+1vIQ/EXyBej:h7PEg3qcv5PvB/EVj

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Executes dropped EXE 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\6812964531.exe
    "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Program Files\Java\jre-1.8\bin\javaw.exe
      "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Temp\6812964531.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:656
      • C:\Program Files\Java\jre-1.8\bin\java.exe
        java -jar C:\Users\Admin\download_libra.jar
        3⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Windows\SYSTEM32\cmd.exe
          cmd.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:836
          • C:\Windows\system32\cacls.exe
            "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
            5⤵
              PID:4548
          • C:\Windows\SYSTEM32\cmd.exe
            cmd /c SCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:1128
            • C:\Windows\system32\schtasks.exe
              SCHTASKS /CREATE /F /SC MINUTE /TN OneDrive\OneDriveUpdateTask /RL HIGHEST /TR C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar
              5⤵
              • Scheduled Task/Job: Scheduled Task
              PID:936
          • C:\Program Files\Java\jre-1.8\bin\javaw.exe
            "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar"
            4⤵
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2596
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:2040
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName /Format:List
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2480
            • C:\Windows\SYSTEM32\cmd.exe
              cmd /c wmic cpu get name
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:4920
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic cpu get name
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:3600
            • C:\Users\Admin\AppData\Local\Temp\cheat.exe
              "C:\Users\Admin\AppData\Local\Temp\cheat.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:4652
              • C:\Windows\System32\Wbem\wmic.exe
                "wmic.exe" csproduct get uuid
                6⤵
                  PID:4404
      • C:\Program Files\Java\jre-1.8\bin\javaw.exe
        "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\cache.jar"
        1⤵
          PID:4652

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\cheat.exe

          Filesize

          229KB

          MD5

          57b52820e80bbf21cb91858308b64a43

          SHA1

          681de078a2bab05ff51d6b211a6136cd0a4cf5c5

          SHA256

          cad17c73e90686eee88e8e73039d69d0969a544a20d324cb30efe4849bf22be2

          SHA512

          981daa6346b6887d92fc77e865a9de661ebdf5216cca2c05a2817b28833a02a07ae5c64d181990dd0d86971e740a44e709b058a50cbef146066e00bce6628454

        • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3350944739-639801879-157714471-1000\83aa4cc77f591dfc2374580bbd95f6ba_dd2803c7-d377-4f06-bdfe-aea230fc7b0e

          Filesize

          45B

          MD5

          c8366ae350e7019aefc9d1e6e6a498c6

          SHA1

          5731d8a3e6568a5f2dfbbc87e3db9637df280b61

          SHA256

          11e6aca8e682c046c83b721eeb5c72c5ef03cb5936c60df6f4993511ddc61238

          SHA512

          33c980d5a638bfc791de291ebf4b6d263b384247ab27f261a54025108f2f85374b579a026e545f81395736dd40fa4696f2163ca17640dd47f1c42bc9971b18cd

        • C:\Users\Admin\download_libra.jar

          Filesize

          25.9MB

          MD5

          ad0d1fed5fd7bc8a1808592e4fe4bcec

          SHA1

          061f79b24e8387be9571799bf317daa9550071cc

          SHA256

          1cea3e26ed3b9314d91ed1595b6d85d14afa85b9047e6dbba6a531b3e93161b6

          SHA512

          6c24340a4a4caec3fa95415dc92c02bfe16eba1b2e8bf79ae6d7bab41859b38745e40a0ac21da252216f6c46ec375c645d4c9a9a6714c0b3204514aad95076e3

        • memory/656-108-0x0000023501F30000-0x0000023501F40000-memory.dmp

          Filesize

          64KB

        • memory/656-115-0x0000023501F40000-0x0000023501F50000-memory.dmp

          Filesize

          64KB

        • memory/656-20-0x0000023501DC0000-0x0000023501DD0000-memory.dmp

          Filesize

          64KB

        • memory/656-22-0x0000023501DD0000-0x0000023501DE0000-memory.dmp

          Filesize

          64KB

        • memory/656-24-0x0000023501DE0000-0x0000023501DF0000-memory.dmp

          Filesize

          64KB

        • memory/656-27-0x0000023501DF0000-0x0000023501E00000-memory.dmp

          Filesize

          64KB

        • memory/656-28-0x0000023501E00000-0x0000023501E10000-memory.dmp

          Filesize

          64KB

        • memory/656-31-0x0000023501E10000-0x0000023501E20000-memory.dmp

          Filesize

          64KB

        • memory/656-39-0x0000023501DA0000-0x0000023501DB0000-memory.dmp

          Filesize

          64KB

        • memory/656-38-0x0000023501E40000-0x0000023501E50000-memory.dmp

          Filesize

          64KB

        • memory/656-37-0x0000023501D90000-0x0000023501DA0000-memory.dmp

          Filesize

          64KB

        • memory/656-36-0x0000023501E30000-0x0000023501E40000-memory.dmp

          Filesize

          64KB

        • memory/656-35-0x0000023501B20000-0x0000023501D90000-memory.dmp

          Filesize

          2.4MB

        • memory/656-32-0x0000023501E20000-0x0000023501E30000-memory.dmp

          Filesize

          64KB

        • memory/656-44-0x0000023501E50000-0x0000023501E60000-memory.dmp

          Filesize

          64KB

        • memory/656-43-0x0000023501DB0000-0x0000023501DC0000-memory.dmp

          Filesize

          64KB

        • memory/656-48-0x0000023501DC0000-0x0000023501DD0000-memory.dmp

          Filesize

          64KB

        • memory/656-49-0x0000023501E60000-0x0000023501E70000-memory.dmp

          Filesize

          64KB

        • memory/656-53-0x0000023501E70000-0x0000023501E80000-memory.dmp

          Filesize

          64KB

        • memory/656-52-0x0000023501DD0000-0x0000023501DE0000-memory.dmp

          Filesize

          64KB

        • memory/656-56-0x0000023501DE0000-0x0000023501DF0000-memory.dmp

          Filesize

          64KB

        • memory/656-57-0x0000023501E80000-0x0000023501E90000-memory.dmp

          Filesize

          64KB

        • memory/656-59-0x0000023501E90000-0x0000023501EA0000-memory.dmp

          Filesize

          64KB

        • memory/656-58-0x0000023501DF0000-0x0000023501E00000-memory.dmp

          Filesize

          64KB

        • memory/656-112-0x0000023501F50000-0x0000023501F60000-memory.dmp

          Filesize

          64KB

        • memory/656-62-0x0000023501EA0000-0x0000023501EB0000-memory.dmp

          Filesize

          64KB

        • memory/656-66-0x0000023501EB0000-0x0000023501EC0000-memory.dmp

          Filesize

          64KB

        • memory/656-65-0x0000023501E20000-0x0000023501E30000-memory.dmp

          Filesize

          64KB

        • memory/656-64-0x0000023501E10000-0x0000023501E20000-memory.dmp

          Filesize

          64KB

        • memory/656-69-0x0000023501EC0000-0x0000023501ED0000-memory.dmp

          Filesize

          64KB

        • memory/656-68-0x0000023501E30000-0x0000023501E40000-memory.dmp

          Filesize

          64KB

        • memory/656-71-0x0000023501ED0000-0x0000023501EE0000-memory.dmp

          Filesize

          64KB

        • memory/656-75-0x0000023501EE0000-0x0000023501EF0000-memory.dmp

          Filesize

          64KB

        • memory/656-74-0x0000023501E40000-0x0000023501E50000-memory.dmp

          Filesize

          64KB

        • memory/656-76-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-113-0x0000023501F30000-0x0000023501F40000-memory.dmp

          Filesize

          64KB

        • memory/656-80-0x0000023501E60000-0x0000023501E70000-memory.dmp

          Filesize

          64KB

        • memory/656-81-0x0000023501EF0000-0x0000023501F00000-memory.dmp

          Filesize

          64KB

        • memory/656-83-0x0000023501E70000-0x0000023501E80000-memory.dmp

          Filesize

          64KB

        • memory/656-84-0x0000023501F00000-0x0000023501F10000-memory.dmp

          Filesize

          64KB

        • memory/656-86-0x0000023501E80000-0x0000023501E90000-memory.dmp

          Filesize

          64KB

        • memory/656-89-0x0000023501E90000-0x0000023501EA0000-memory.dmp

          Filesize

          64KB

        • memory/656-90-0x0000023501F10000-0x0000023501F20000-memory.dmp

          Filesize

          64KB

        • memory/656-92-0x0000023501EA0000-0x0000023501EB0000-memory.dmp

          Filesize

          64KB

        • memory/656-93-0x0000023501EB0000-0x0000023501EC0000-memory.dmp

          Filesize

          64KB

        • memory/656-94-0x0000023501EC0000-0x0000023501ED0000-memory.dmp

          Filesize

          64KB

        • memory/656-95-0x0000023501ED0000-0x0000023501EE0000-memory.dmp

          Filesize

          64KB

        • memory/656-96-0x0000023501EE0000-0x0000023501EF0000-memory.dmp

          Filesize

          64KB

        • memory/656-98-0x0000023501EF0000-0x0000023501F00000-memory.dmp

          Filesize

          64KB

        • memory/656-99-0x0000023501F20000-0x0000023501F30000-memory.dmp

          Filesize

          64KB

        • memory/656-101-0x0000023501F00000-0x0000023501F10000-memory.dmp

          Filesize

          64KB

        • memory/656-103-0x0000023501F10000-0x0000023501F20000-memory.dmp

          Filesize

          64KB

        • memory/656-104-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-107-0x0000023501F20000-0x0000023501F30000-memory.dmp

          Filesize

          64KB

        • memory/656-3-0x0000023501B20000-0x0000023501D90000-memory.dmp

          Filesize

          2.4MB

        • memory/656-109-0x0000023501F40000-0x0000023501F50000-memory.dmp

          Filesize

          64KB

        • memory/656-61-0x0000023501E00000-0x0000023501E10000-memory.dmp

          Filesize

          64KB

        • memory/656-18-0x0000023501DB0000-0x0000023501DC0000-memory.dmp

          Filesize

          64KB

        • memory/656-77-0x0000023501E50000-0x0000023501E60000-memory.dmp

          Filesize

          64KB

        • memory/656-117-0x0000023501F50000-0x0000023501F60000-memory.dmp

          Filesize

          64KB

        • memory/656-119-0x0000023501F60000-0x0000023501F70000-memory.dmp

          Filesize

          64KB

        • memory/656-122-0x0000023501F60000-0x0000023501F70000-memory.dmp

          Filesize

          64KB

        • memory/656-128-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-132-0x0000023501F70000-0x0000023501F80000-memory.dmp

          Filesize

          64KB

        • memory/656-136-0x0000023501F90000-0x0000023501FA0000-memory.dmp

          Filesize

          64KB

        • memory/656-135-0x0000023501F80000-0x0000023501F90000-memory.dmp

          Filesize

          64KB

        • memory/656-138-0x0000023501FA0000-0x0000023501FB0000-memory.dmp

          Filesize

          64KB

        • memory/656-140-0x0000023501FB0000-0x0000023501FC0000-memory.dmp

          Filesize

          64KB

        • memory/656-142-0x0000023501FC0000-0x0000023501FD0000-memory.dmp

          Filesize

          64KB

        • memory/656-144-0x0000023501FD0000-0x0000023501FE0000-memory.dmp

          Filesize

          64KB

        • memory/656-146-0x0000023501FE0000-0x0000023501FF0000-memory.dmp

          Filesize

          64KB

        • memory/656-148-0x0000023501FF0000-0x0000023502000000-memory.dmp

          Filesize

          64KB

        • memory/656-151-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-154-0x0000023501F70000-0x0000023501F80000-memory.dmp

          Filesize

          64KB

        • memory/656-156-0x0000023501F80000-0x0000023501F90000-memory.dmp

          Filesize

          64KB

        • memory/656-158-0x0000023502000000-0x0000023502010000-memory.dmp

          Filesize

          64KB

        • memory/656-157-0x0000023501F90000-0x0000023501FA0000-memory.dmp

          Filesize

          64KB

        • memory/656-160-0x0000023502010000-0x0000023502020000-memory.dmp

          Filesize

          64KB

        • memory/656-164-0x0000023502020000-0x0000023502030000-memory.dmp

          Filesize

          64KB

        • memory/656-163-0x0000023501FA0000-0x0000023501FB0000-memory.dmp

          Filesize

          64KB

        • memory/656-167-0x0000023501FB0000-0x0000023501FC0000-memory.dmp

          Filesize

          64KB

        • memory/656-168-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-174-0x0000023502030000-0x0000023502040000-memory.dmp

          Filesize

          64KB

        • memory/656-173-0x0000023501FC0000-0x0000023501FD0000-memory.dmp

          Filesize

          64KB

        • memory/656-16-0x0000023501DA0000-0x0000023501DB0000-memory.dmp

          Filesize

          64KB

        • memory/656-12-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-186-0x0000023501FD0000-0x0000023501FE0000-memory.dmp

          Filesize

          64KB

        • memory/656-14-0x0000023501D90000-0x0000023501DA0000-memory.dmp

          Filesize

          64KB

        • memory/656-199-0x0000023501FE0000-0x0000023501FF0000-memory.dmp

          Filesize

          64KB

        • memory/656-223-0x0000023501E40000-0x0000023501E50000-memory.dmp

          Filesize

          64KB

        • memory/656-202-0x0000023501FF0000-0x0000023502000000-memory.dmp

          Filesize

          64KB

        • memory/656-224-0x0000023501D90000-0x0000023501DA0000-memory.dmp

          Filesize

          64KB

        • memory/656-225-0x0000023501DA0000-0x0000023501DB0000-memory.dmp

          Filesize

          64KB

        • memory/656-222-0x00000235002D0000-0x00000235002D1000-memory.dmp

          Filesize

          4KB

        • memory/656-232-0x0000023501E10000-0x0000023501E20000-memory.dmp

          Filesize

          64KB

        • memory/656-231-0x0000023501E00000-0x0000023501E10000-memory.dmp

          Filesize

          64KB

        • memory/656-230-0x0000023501DF0000-0x0000023501E00000-memory.dmp

          Filesize

          64KB

        • memory/656-229-0x0000023501DE0000-0x0000023501DF0000-memory.dmp

          Filesize

          64KB

        • memory/656-228-0x0000023501DD0000-0x0000023501DE0000-memory.dmp

          Filesize

          64KB

        • memory/656-227-0x0000023501DC0000-0x0000023501DD0000-memory.dmp

          Filesize

          64KB

        • memory/656-226-0x0000023501DB0000-0x0000023501DC0000-memory.dmp

          Filesize

          64KB

        • memory/2596-263-0x0000019CEB8D0000-0x0000019CEB8D1000-memory.dmp

          Filesize

          4KB

        • memory/2596-268-0x0000019CEB8D0000-0x0000019CEB8D1000-memory.dmp

          Filesize

          4KB

        • memory/2596-286-0x0000019CEB8D0000-0x0000019CEB8D1000-memory.dmp

          Filesize

          4KB

        • memory/2596-288-0x0000019CEB8D0000-0x0000019CEB8D1000-memory.dmp

          Filesize

          4KB

        • memory/2596-301-0x0000019CEB8D0000-0x0000019CEB8D1000-memory.dmp

          Filesize

          4KB

        • memory/2596-308-0x0000019CEB8D0000-0x0000019CEB8D1000-memory.dmp

          Filesize

          4KB

        • memory/3356-0-0x0000000000670000-0x000000000068F000-memory.dmp

          Filesize

          124KB

        • memory/4652-284-0x00000294EB7B0000-0x00000294EB7B1000-memory.dmp

          Filesize

          4KB

        • memory/4972-221-0x0000014BBA440000-0x0000014BBA6B0000-memory.dmp

          Filesize

          2.4MB

        • memory/4972-208-0x0000014BBA420000-0x0000014BBA421000-memory.dmp

          Filesize

          4KB

        • memory/4972-198-0x0000014BBA420000-0x0000014BBA421000-memory.dmp

          Filesize

          4KB

        • memory/4972-187-0x0000014BBA440000-0x0000014BBA6B0000-memory.dmp

          Filesize

          2.4MB