Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    125s
  • max time network
    143s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    12/01/2025, 05:06

General

  • Target

    resembleC2.exe

  • Size

    128KB

  • MD5

    4c8044c83f60465eae3cc16d7c858085

  • SHA1

    bc837ba36a8f244283483210215a11607f05fb63

  • SHA256

    331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8

  • SHA512

    f4783ae1591dafc44b1731c34dfced82e5285099a4066b6492e063b1ca5edb4a0916fcad0617b38c0fc754c304d932879cf3014bfce83c0b9a7219f8bc737432

  • SSDEEP

    3072:oRt4KXzdjBFUxzV4NsFYGvL9JjyVcUuyTRc8R:q4gRjBF4SKFYMLbjxUBRc8

Malware Config

Signatures

  • Detect Umbral payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\resembleC2.exe
    "C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe
      "C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2996
    • C:\Users\Admin\AppData\Local\Temp\MoonHub.exe
      "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
      • C:\Windows\SYSTEM32\attrib.exe
        "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"
        3⤵
        • Views/modifies file attributes
        PID:1424
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MoonHub.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:784
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:3940
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        PID:2824
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4740
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1728
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
          PID:4280
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic.exe" csproduct get uuid
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:888
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:4952
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          3⤵
          • Detects videocard installed
          • Suspicious behavior: EnumeratesProcesses
          PID:1108
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe" && pause
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Suspicious use of WriteProcessMemory
          PID:4948
          • C:\Windows\system32\PING.EXE
            ping localhost
            4⤵
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:2948
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5024
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4204,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=1324 /prefetch:8
      1⤵
        PID:1632
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5276,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:8
        1⤵
          PID:3340

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

          Filesize

          3KB

          MD5

          3eb3833f769dd890afc295b977eab4b4

          SHA1

          e857649b037939602c72ad003e5d3698695f436f

          SHA256

          c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485

          SHA512

          c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          d671caf6268c7434a0c8b4ed72503539

          SHA1

          dbbf7a2caf375efb618fabb60c3cb5c4e9d45916

          SHA256

          130f55cf2d336c55d7650680e06b60a1fb77fe1f7aa9f8b7b1081ec621a5f4c4

          SHA512

          3f581709d1edea3a98d5829f7448d0a05a6f6e71988d096395cf4886f1d4a1ef0c2841d860d6bd445096d4fd99097a135bf6a865a35a323e16b3f0efe9d6db90

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          60b3262c3163ee3d466199160b9ed07d

          SHA1

          994ece4ea4e61de0be2fdd580f87e3415f9e1ff6

          SHA256

          e3b30f16d41f94cba2b8a75f35c91ae7418465abfbfe5477ec0551d1952b2fdb

          SHA512

          081d2015cb94477eb0fbc38f44b6d9b4a3204fb3ad0b7d0e146a88ab4ab9a0d475207f1adae03f4a81ccc5beb7568dc8be1249f69e32fe56efd9ee2f6ee3b1af

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          948B

          MD5

          4359546acae1310d9a8a7c8e58c7adca

          SHA1

          5ab2be19efcc2443e12ca714d9bb73943bc2ca6c

          SHA256

          865f30e2e1999202fc5d9917c6a77c0faa430ba0d8e454a2511630c7a3cdbb68

          SHA512

          528e942242886c7f1d20c2efd48cfde452754e6e3755d7ff0faa11daa85c81c82b64bc5e57d7a3ce61bffcce03dc18c8973ecb1ce754e4fb705fda0416d6dc5e

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

          Filesize

          1KB

          MD5

          8e1fdd1b66d2fee9f6a052524d4ddca5

          SHA1

          0a9d0994559d1be2eecd8b0d6960540ca627bdb6

          SHA256

          4cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13

          SHA512

          5a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3

        • C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe

          Filesize

          45KB

          MD5

          8c7d2f0a936dbe6d0899d40171ffb668

          SHA1

          0b22fcd904f3b0fa2555a32a2635423668fc4616

          SHA256

          85f5f5acb54c30efd4f84c0f11c834b7dab98c5bb7357bddcd29fbe5babc4db6

          SHA512

          463a48ec2752fd002e82dfe555abd03fc666a523da99e0e848788eeff6f98d06d36a360cfd7ad70d342bb4c90a49131a3428f1404d17e04a7fe5a1022c1faa65

        • C:\Users\Admin\AppData\Local\Temp\MoonHub.exe

          Filesize

          231KB

          MD5

          f70b5e56a09af292d4e909c547f9c8c0

          SHA1

          577883bdbe8dc9582e15e7a1212b1fe432bafce3

          SHA256

          8fd22c5acb3144dbaa5ab3f9dd5901eb6f3beef67e72ea431246c6a790c067de

          SHA512

          e54ccb56aa6473abd3530493933d5164f2dff02076e0f03443382f02d177a52e318d8d0f432e6a3fb5620eaffd09f2dbf6ccbf9698ba149b149c594fa162d879

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_maxk5sap.rb3.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\resemble.py

          Filesize

          27KB

          MD5

          23f1fabaef532d89fcb6d5bb14a36ef3

          SHA1

          679a82ed172d49f298bf07b6fa0de9b6c2ce0046

          SHA256

          e4410bc67b1ee8af2df456713b85040917b8cf749fb7d660feeb625b25ec9c51

          SHA512

          96e2baa6ce0220b9ad167b60220c683d5b080a9ba9a2e4d320aae6989f4aa2d241f8078e69bdd2da39a20d9b57ae84240da912d29e5e1db36cc90cf6a0537458

        • memory/784-50-0x0000015577460000-0x0000015577482000-memory.dmp

          Filesize

          136KB

        • memory/1528-67-0x000002A70E6A0000-0x000002A70E6F0000-memory.dmp

          Filesize

          320KB

        • memory/1528-39-0x000002A70C8E0000-0x000002A70C920000-memory.dmp

          Filesize

          256KB

        • memory/1528-66-0x000002A727000000-0x000002A727076000-memory.dmp

          Filesize

          472KB

        • memory/1528-70-0x000002A70E680000-0x000002A70E69E000-memory.dmp

          Filesize

          120KB

        • memory/1528-94-0x000002A727090000-0x000002A72709A000-memory.dmp

          Filesize

          40KB

        • memory/1528-95-0x000002A727110000-0x000002A727122000-memory.dmp

          Filesize

          72KB

        • memory/2996-17-0x0000000000BB0000-0x0000000000BC0000-memory.dmp

          Filesize

          64KB

        • memory/2996-23-0x00007FFE58160000-0x00007FFE58C22000-memory.dmp

          Filesize

          10.8MB

        • memory/2996-110-0x00007FFE58160000-0x00007FFE58C22000-memory.dmp

          Filesize

          10.8MB

        • memory/3820-40-0x00007FFE58160000-0x00007FFE58C22000-memory.dmp

          Filesize

          10.8MB

        • memory/3820-0-0x00007FFE58163000-0x00007FFE58165000-memory.dmp

          Filesize

          8KB

        • memory/3820-18-0x00007FFE58160000-0x00007FFE58C22000-memory.dmp

          Filesize

          10.8MB

        • memory/3820-1-0x0000000000EA0000-0x0000000000EC6000-memory.dmp

          Filesize

          152KB