Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 18:43
Behavioral task
behavioral1
Sample
Umbrella.flv.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Umbrella.flv.exe
Resource
win10v2004-20241007-en
General
-
Target
Umbrella.flv.exe
-
Size
93KB
-
MD5
9c8cfc8027b21ff03525c1880ed347c1
-
SHA1
3565ba9d14ab917ed66625a968bef184089e3c32
-
SHA256
76231f72576c98527990b748706fd506d2fed084d12ebdc7b4e7952d1859e236
-
SHA512
dbc67bc5c71bc69010db8fa4d94e574f6b804216236b77af35d0f493230d5049716ed28a25256790ecfec8b33c02ad7f6b57c664c35d1b7dec899495eb089aac
-
SSDEEP
768:mHY3Oxqctib5nkPQW63m/HsqmGzh+IxvXnKN2tfKkXxrjEtCdnl2pi1Rz4Rk3+ir:ox3iFqHsJE4I15tTjEwzGi1dDPDbgS
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3612 netsh.exe -
Drops startup file 4 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\01d59f5df160e737b4f48d99a25a641ajava.exe Umbrella.flv.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java.exe Umbrella.flv.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java.exe Umbrella.flv.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\01d59f5df160e737b4f48d99a25a641ajava.exe Umbrella.flv.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf Umbrella.flv.exe File opened for modification C:\autorun.inf Umbrella.flv.exe File created F:\autorun.inf Umbrella.flv.exe File opened for modification F:\autorun.inf Umbrella.flv.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Umbrella.flv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe 648 Umbrella.flv.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 648 Umbrella.flv.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe Token: 33 648 Umbrella.flv.exe Token: SeIncBasePriorityPrivilege 648 Umbrella.flv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 648 wrote to memory of 3612 648 Umbrella.flv.exe 87 PID 648 wrote to memory of 3612 648 Umbrella.flv.exe 87 PID 648 wrote to memory of 3612 648 Umbrella.flv.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Umbrella.flv.exe"C:\Users\Admin\AppData\Local\Temp\Umbrella.flv.exe"1⤵
- Drops startup file
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Umbrella.flv.exe" "Umbrella.flv.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD59c8cfc8027b21ff03525c1880ed347c1
SHA13565ba9d14ab917ed66625a968bef184089e3c32
SHA25676231f72576c98527990b748706fd506d2fed084d12ebdc7b4e7952d1859e236
SHA512dbc67bc5c71bc69010db8fa4d94e574f6b804216236b77af35d0f493230d5049716ed28a25256790ecfec8b33c02ad7f6b57c664c35d1b7dec899495eb089aac