Analysis
-
max time kernel
125s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 20:53
Behavioral task
behavioral1
Sample
Umbral.Stealer.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Umbral.Stealer.zip
Resource
win10v2004-20241007-en
General
-
Target
Umbral.Stealer.zip
-
Size
3.3MB
-
MD5
f355889db3ff6bae624f80f41a52e619
-
SHA1
47f7916272a81d313e70808270c3c351207b890f
-
SHA256
8e95865efd39220dfc4abebc27141d9eae288a11981e43f09cbee6bf90347fe0
-
SHA512
bff7636f6cc0fadfd6f027e2ebda9e80fd5c64d551b2c666929b2d990509af73b082d739f14bb1497be292eafe703ebd5d7188493e2cc34b73d249fe901820eb
-
SSDEEP
98304:XINn7mVoLvbDU48xzliDSjtYV2jg0tsGTplmOhl88uF:mjLvvD8BcSjtAB0zplNl8Z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Umbral.builder.exepid process 2176 Umbral.builder.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
7zFM.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings 7zFM.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
7zFM.exepid process 2844 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exeAcroRd32.exepid process 2844 7zFM.exe 2676 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2844 7zFM.exe Token: 35 2844 7zFM.exe Token: SeSecurityPrivilege 2844 7zFM.exe Token: SeSecurityPrivilege 2844 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
7zFM.exepid process 2844 7zFM.exe 2844 7zFM.exe 2844 7zFM.exe 2844 7zFM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
7zFM.exeUmbral.builder.exedescription pid process target process PID 2844 wrote to memory of 2176 2844 7zFM.exe Umbral.builder.exe PID 2844 wrote to memory of 2176 2844 7zFM.exe Umbral.builder.exe PID 2844 wrote to memory of 2176 2844 7zFM.exe Umbral.builder.exe PID 2176 wrote to memory of 2440 2176 Umbral.builder.exe WerFault.exe PID 2176 wrote to memory of 2440 2176 Umbral.builder.exe WerFault.exe PID 2176 wrote to memory of 2440 2176 Umbral.builder.exe WerFault.exe PID 2844 wrote to memory of 2676 2844 7zFM.exe AcroRd32.exe PID 2844 wrote to memory of 2676 2844 7zFM.exe AcroRd32.exe PID 2844 wrote to memory of 2676 2844 7zFM.exe AcroRd32.exe PID 2844 wrote to memory of 2676 2844 7zFM.exe AcroRd32.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Umbral.Stealer.zip"1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\7zOC1BFE1D6\Umbral.builder.exe"C:\Users\Admin\AppData\Local\Temp\7zOC1BFE1D6\Umbral.builder.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2176 -s 6043⤵PID:2440
-
-
-
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\7zOC1B9F9F6\Umbral.builder.exe.config"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163B
MD5dccd44fb11b8e4ebdfb822e809a54b6f
SHA11889d5ae8c7c70c051cbde104af6e0f31f8c1b63
SHA2566862b25736259f7bfd344e43eea10a703885be381eee2a745ceb12916b01a158
SHA512dadffe41bdadfc3a79cb34369c9a8b37ce4833aee18058b02dcb13d64007f022b80b63ab404572c60278937cf83b06b00712ff9ee302e725b9d5c7fe14bd5f50
-
Filesize
114KB
MD5d91fb6867df7e4303d98b5e90faae73c
SHA1496f53ad8cd9381f1c1b577a73e978081002c1db
SHA256bb19b002df31e1196b4e6530cf54c449e9cf1383d3adc5334a0442fa96b36344
SHA5125dbcfe9bf567c6f1e18027950726af1835ab8b363ba8b040fd379b4cfe94b0894bc969b3c04fa4f1964b441a7b894bd4d37f3aabe3ea31396687a6ca093cfdc9