Analysis

  • max time kernel
    94s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 22:07

General

  • Target

    4a9d829d1caa33793d986642b519ee710b3d1af421f975096e5e09c0ef4e78f8.exe

  • Size

    1.0MB

  • MD5

    5a5cbc6f945837008dc0d0ead368992d

  • SHA1

    aba12623631d97ba90e4c827d19237ac70513ab1

  • SHA256

    4a9d829d1caa33793d986642b519ee710b3d1af421f975096e5e09c0ef4e78f8

  • SHA512

    1f6b6e31ddcc0be6661673e71ef8d90f9dfe144b385de1a355d2603e40d0293a575b0e64e4478959c03fcf03d48b73c20155e8907f7b39832ab1d9fb2193178b

  • SSDEEP

    24576:ZVvTLevDohsF9gI8kgn9GuBH0dP6aPpBY87n777M777777u:ZVrLNsHL7n777M777777

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a9d829d1caa33793d986642b519ee710b3d1af421f975096e5e09c0ef4e78f8.exe
    "C:\Users\Admin\AppData\Local\Temp\4a9d829d1caa33793d986642b519ee710b3d1af421f975096e5e09c0ef4e78f8.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\TL.exe
      "C:\Users\Admin\AppData\Local\Temp\TL.exe"
      2⤵
      • Executes dropped EXE
      PID:3584
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3996

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\TL.exe

    Filesize

    583KB

    MD5

    690272e4fb07da4793b636eac9cc6733

    SHA1

    3e1baebcfddd4f2e372272cb5ed530cee5b8f145

    SHA256

    969e8f0ca48c14a43ae7eeda3674d0788830958f6010f98c9f58eab4502d2a6c

    SHA512

    add4a5e66af20878b8e026a5ac7d3e5c71ef9ccae14c10e4ee1388d6b843db5b9d9b306e2116235a21c340eb758e54081d3770404b13c12a83bd135bff78a45c

  • memory/1316-0-0x00000000745DE000-0x00000000745DF000-memory.dmp

    Filesize

    4KB

  • memory/1316-1-0x0000000000C40000-0x0000000000D4E000-memory.dmp

    Filesize

    1.1MB

  • memory/1316-2-0x00000000056C0000-0x000000000575C000-memory.dmp

    Filesize

    624KB

  • memory/3584-16-0x00007FFC72C33000-0x00007FFC72C35000-memory.dmp

    Filesize

    8KB

  • memory/3584-15-0x0000000000E10000-0x0000000000EA8000-memory.dmp

    Filesize

    608KB