Analysis
-
max time kernel
103s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-01-2025 05:11
Static task
static1
Behavioral task
behavioral1
Sample
resembleC2.exe
Resource
win7-20241010-en
General
-
Target
resembleC2.exe
-
Size
128KB
-
MD5
4c8044c83f60465eae3cc16d7c858085
-
SHA1
bc837ba36a8f244283483210215a11607f05fb63
-
SHA256
331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8
-
SHA512
f4783ae1591dafc44b1731c34dfced82e5285099a4066b6492e063b1ca5edb4a0916fcad0617b38c0fc754c304d932879cf3014bfce83c0b9a7219f8bc737432
-
SSDEEP
3072:oRt4KXzdjBFUxzV4NsFYGvL9JjyVcUuyTRc8R:q4gRjBF4SKFYMLbjxUBRc8
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326652489054818346/f_cBTMEYAkXYcTbEkW-MUwYrefMORTfuoofsZ5ymJ5yR8BQpohmaCuB-PwAuIP1xAUKw
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/2848-16-0x00000000008C0000-0x0000000000900000-memory.dmp family_umbral behavioral1/files/0x000900000001756e-15.dat family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2320 powershell.exe 1084 powershell.exe 2684 powershell.exe 1864 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts MoonHub.exe -
Executes dropped EXE 2 IoCs
pid Process 2968 6z2guuz0ldkdgc1o.exe 2848 MoonHub.exe -
Loads dropped DLL 1 IoCs
pid Process 2172 resembleC2.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 7 0.tcp.eu.ngrok.io 14 discord.com 15 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1536 cmd.exe 1668 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1588 wmic.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1668 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2848 MoonHub.exe 2320 powershell.exe 1084 powershell.exe 2684 powershell.exe 1148 powershell.exe 1864 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1616 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2848 MoonHub.exe Token: SeDebugPrivilege 2968 6z2guuz0ldkdgc1o.exe Token: SeIncBasePriorityPrivilege 2968 6z2guuz0ldkdgc1o.exe Token: SeIncreaseQuotaPrivilege 820 wmic.exe Token: SeSecurityPrivilege 820 wmic.exe Token: SeTakeOwnershipPrivilege 820 wmic.exe Token: SeLoadDriverPrivilege 820 wmic.exe Token: SeSystemProfilePrivilege 820 wmic.exe Token: SeSystemtimePrivilege 820 wmic.exe Token: SeProfSingleProcessPrivilege 820 wmic.exe Token: SeIncBasePriorityPrivilege 820 wmic.exe Token: SeCreatePagefilePrivilege 820 wmic.exe Token: SeBackupPrivilege 820 wmic.exe Token: SeRestorePrivilege 820 wmic.exe Token: SeShutdownPrivilege 820 wmic.exe Token: SeDebugPrivilege 820 wmic.exe Token: SeSystemEnvironmentPrivilege 820 wmic.exe Token: SeRemoteShutdownPrivilege 820 wmic.exe Token: SeUndockPrivilege 820 wmic.exe Token: SeManageVolumePrivilege 820 wmic.exe Token: 33 820 wmic.exe Token: 34 820 wmic.exe Token: 35 820 wmic.exe Token: SeIncreaseQuotaPrivilege 820 wmic.exe Token: SeSecurityPrivilege 820 wmic.exe Token: SeTakeOwnershipPrivilege 820 wmic.exe Token: SeLoadDriverPrivilege 820 wmic.exe Token: SeSystemProfilePrivilege 820 wmic.exe Token: SeSystemtimePrivilege 820 wmic.exe Token: SeProfSingleProcessPrivilege 820 wmic.exe Token: SeIncBasePriorityPrivilege 820 wmic.exe Token: SeCreatePagefilePrivilege 820 wmic.exe Token: SeBackupPrivilege 820 wmic.exe Token: SeRestorePrivilege 820 wmic.exe Token: SeShutdownPrivilege 820 wmic.exe Token: SeDebugPrivilege 820 wmic.exe Token: SeSystemEnvironmentPrivilege 820 wmic.exe Token: SeRemoteShutdownPrivilege 820 wmic.exe Token: SeUndockPrivilege 820 wmic.exe Token: SeManageVolumePrivilege 820 wmic.exe Token: 33 820 wmic.exe Token: 34 820 wmic.exe Token: 35 820 wmic.exe Token: SeDebugPrivilege 2320 powershell.exe Token: SeDebugPrivilege 1084 powershell.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeIncreaseQuotaPrivilege 552 wmic.exe Token: SeSecurityPrivilege 552 wmic.exe Token: SeTakeOwnershipPrivilege 552 wmic.exe Token: SeLoadDriverPrivilege 552 wmic.exe Token: SeSystemProfilePrivilege 552 wmic.exe Token: SeSystemtimePrivilege 552 wmic.exe Token: SeProfSingleProcessPrivilege 552 wmic.exe Token: SeIncBasePriorityPrivilege 552 wmic.exe Token: SeCreatePagefilePrivilege 552 wmic.exe Token: SeBackupPrivilege 552 wmic.exe Token: SeRestorePrivilege 552 wmic.exe Token: SeShutdownPrivilege 552 wmic.exe Token: SeDebugPrivilege 552 wmic.exe Token: SeSystemEnvironmentPrivilege 552 wmic.exe Token: SeRemoteShutdownPrivilege 552 wmic.exe Token: SeUndockPrivilege 552 wmic.exe Token: SeManageVolumePrivilege 552 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1616 AcroRd32.exe 1616 AcroRd32.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2968 2172 resembleC2.exe 29 PID 2172 wrote to memory of 2968 2172 resembleC2.exe 29 PID 2172 wrote to memory of 2968 2172 resembleC2.exe 29 PID 2172 wrote to memory of 2116 2172 resembleC2.exe 30 PID 2172 wrote to memory of 2116 2172 resembleC2.exe 30 PID 2172 wrote to memory of 2116 2172 resembleC2.exe 30 PID 2172 wrote to memory of 2848 2172 resembleC2.exe 31 PID 2172 wrote to memory of 2848 2172 resembleC2.exe 31 PID 2172 wrote to memory of 2848 2172 resembleC2.exe 31 PID 2116 wrote to memory of 1616 2116 rundll32.exe 33 PID 2116 wrote to memory of 1616 2116 rundll32.exe 33 PID 2116 wrote to memory of 1616 2116 rundll32.exe 33 PID 2116 wrote to memory of 1616 2116 rundll32.exe 33 PID 2848 wrote to memory of 820 2848 MoonHub.exe 34 PID 2848 wrote to memory of 820 2848 MoonHub.exe 34 PID 2848 wrote to memory of 820 2848 MoonHub.exe 34 PID 2848 wrote to memory of 1360 2848 MoonHub.exe 36 PID 2848 wrote to memory of 1360 2848 MoonHub.exe 36 PID 2848 wrote to memory of 1360 2848 MoonHub.exe 36 PID 2848 wrote to memory of 2320 2848 MoonHub.exe 38 PID 2848 wrote to memory of 2320 2848 MoonHub.exe 38 PID 2848 wrote to memory of 2320 2848 MoonHub.exe 38 PID 2848 wrote to memory of 1084 2848 MoonHub.exe 40 PID 2848 wrote to memory of 1084 2848 MoonHub.exe 40 PID 2848 wrote to memory of 1084 2848 MoonHub.exe 40 PID 2848 wrote to memory of 2684 2848 MoonHub.exe 42 PID 2848 wrote to memory of 2684 2848 MoonHub.exe 42 PID 2848 wrote to memory of 2684 2848 MoonHub.exe 42 PID 2848 wrote to memory of 1148 2848 MoonHub.exe 44 PID 2848 wrote to memory of 1148 2848 MoonHub.exe 44 PID 2848 wrote to memory of 1148 2848 MoonHub.exe 44 PID 2848 wrote to memory of 552 2848 MoonHub.exe 46 PID 2848 wrote to memory of 552 2848 MoonHub.exe 46 PID 2848 wrote to memory of 552 2848 MoonHub.exe 46 PID 2848 wrote to memory of 1656 2848 MoonHub.exe 48 PID 2848 wrote to memory of 1656 2848 MoonHub.exe 48 PID 2848 wrote to memory of 1656 2848 MoonHub.exe 48 PID 2848 wrote to memory of 2648 2848 MoonHub.exe 50 PID 2848 wrote to memory of 2648 2848 MoonHub.exe 50 PID 2848 wrote to memory of 2648 2848 MoonHub.exe 50 PID 2848 wrote to memory of 1864 2848 MoonHub.exe 52 PID 2848 wrote to memory of 1864 2848 MoonHub.exe 52 PID 2848 wrote to memory of 1864 2848 MoonHub.exe 52 PID 2848 wrote to memory of 1588 2848 MoonHub.exe 54 PID 2848 wrote to memory of 1588 2848 MoonHub.exe 54 PID 2848 wrote to memory of 1588 2848 MoonHub.exe 54 PID 2848 wrote to memory of 1536 2848 MoonHub.exe 56 PID 2848 wrote to memory of 1536 2848 MoonHub.exe 56 PID 2848 wrote to memory of 1536 2848 MoonHub.exe 56 PID 1536 wrote to memory of 1668 1536 cmd.exe 58 PID 1536 wrote to memory of 1668 1536 cmd.exe 58 PID 1536 wrote to memory of 1668 1536 cmd.exe 58 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1360 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"C:\Users\Admin\AppData\Local\Temp\resembleC2.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\resemble.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\resemble.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"3⤵
- Views/modifies file attributes
PID:1360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MoonHub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:1656
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:2648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:1588
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1668
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
231KB
MD5f70b5e56a09af292d4e909c547f9c8c0
SHA1577883bdbe8dc9582e15e7a1212b1fe432bafce3
SHA2568fd22c5acb3144dbaa5ab3f9dd5901eb6f3beef67e72ea431246c6a790c067de
SHA512e54ccb56aa6473abd3530493933d5164f2dff02076e0f03443382f02d177a52e318d8d0f432e6a3fb5620eaffd09f2dbf6ccbf9698ba149b149c594fa162d879
-
Filesize
27KB
MD523f1fabaef532d89fcb6d5bb14a36ef3
SHA1679a82ed172d49f298bf07b6fa0de9b6c2ce0046
SHA256e4410bc67b1ee8af2df456713b85040917b8cf749fb7d660feeb625b25ec9c51
SHA51296e2baa6ce0220b9ad167b60220c683d5b080a9ba9a2e4d320aae6989f4aa2d241f8078e69bdd2da39a20d9b57ae84240da912d29e5e1db36cc90cf6a0537458
-
Filesize
3KB
MD524c3c5ddead554d2c3a00a142ae5bbbf
SHA19fc43c418b6bd50f219842ab260a57be27907013
SHA256c11a425ab7ceaaa4a4884348630ce94302b902b1ca4a617aa5d314bb49357adc
SHA512cecb5e78381fee3c7b3353ff13bda162b07d62dfff7c6f95f0c1e02f15e3a2e6955eca96d0f756c49ad3122edfe493c72a7aa59be74143990fa6244c722da85f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD59b54008186d589c901520b42269329c3
SHA185b7a7751827c519456dc6f9654131b310edf191
SHA2564fde5f8d6ccc464859a3ebfe4584e7e33c0e646ecfe3862198afc5d0db42dbbd
SHA512e9d1fc705e4f17c91da7e5156794f1c590c68728b85930f6c30eb9b948ee2b08804f2956405900be0a4d8682fd9746d487e370a21a8a63b36bcd93795dee9bea
-
Filesize
45KB
MD58c7d2f0a936dbe6d0899d40171ffb668
SHA10b22fcd904f3b0fa2555a32a2635423668fc4616
SHA25685f5f5acb54c30efd4f84c0f11c834b7dab98c5bb7357bddcd29fbe5babc4db6
SHA512463a48ec2752fd002e82dfe555abd03fc666a523da99e0e848788eeff6f98d06d36a360cfd7ad70d342bb4c90a49131a3428f1404d17e04a7fe5a1022c1faa65