Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-02-2025 15:30
Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20240903-en
General
-
Target
svchost.exe
-
Size
603KB
-
MD5
cbde7887e32b1c0837b4f5feaccfd19a
-
SHA1
979443ec0ee69c4aa59ba87b7fe631f733f39a68
-
SHA256
20367536f2263f53c3a52f574cbe883e539c7b2fb6cf344c8e1c9f6ed69c8c6c
-
SHA512
a8dbf07713cb6773df248f13b387f9edca8083a4f838b82fbfb571a107cd28125138174192f1dd5fa3dce3ed64cfcbb1ae5be1d96a55261b8621005012f050f8
-
SSDEEP
12288:5LQcwNyJ6oF2FqYTchKt8RjIxEWhD8Tr+38DijMCsiHzBQ:5LGNumChKt8RjOEE8Tr+32yFQ
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1341138809076580472/3ehaOBt6yczEOxijoe7qO4ibtxLRCBhrrlthr7XUGysvedyTnQ_Pzy0Ljrdt-SbR04Bm
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/memory/2368-8-0x0000000000FB0000-0x0000000000FF0000-memory.dmp family_umbral behavioral1/files/0x000d0000000131aa-6.dat family_umbral -
Umbral family
-
Executes dropped EXE 2 IoCs
pid Process 2368 Payload.exe 2936 XClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XClient.exe -
Suspicious use of AdjustPrivilegeToken 42 IoCs
description pid Process Token: SeDebugPrivilege 2368 Payload.exe Token: SeDebugPrivilege 2936 XClient.exe Token: SeIncreaseQuotaPrivilege 12272 wmic.exe Token: SeSecurityPrivilege 12272 wmic.exe Token: SeTakeOwnershipPrivilege 12272 wmic.exe Token: SeLoadDriverPrivilege 12272 wmic.exe Token: SeSystemProfilePrivilege 12272 wmic.exe Token: SeSystemtimePrivilege 12272 wmic.exe Token: SeProfSingleProcessPrivilege 12272 wmic.exe Token: SeIncBasePriorityPrivilege 12272 wmic.exe Token: SeCreatePagefilePrivilege 12272 wmic.exe Token: SeBackupPrivilege 12272 wmic.exe Token: SeRestorePrivilege 12272 wmic.exe Token: SeShutdownPrivilege 12272 wmic.exe Token: SeDebugPrivilege 12272 wmic.exe Token: SeSystemEnvironmentPrivilege 12272 wmic.exe Token: SeRemoteShutdownPrivilege 12272 wmic.exe Token: SeUndockPrivilege 12272 wmic.exe Token: SeManageVolumePrivilege 12272 wmic.exe Token: 33 12272 wmic.exe Token: 34 12272 wmic.exe Token: 35 12272 wmic.exe Token: SeIncreaseQuotaPrivilege 12272 wmic.exe Token: SeSecurityPrivilege 12272 wmic.exe Token: SeTakeOwnershipPrivilege 12272 wmic.exe Token: SeLoadDriverPrivilege 12272 wmic.exe Token: SeSystemProfilePrivilege 12272 wmic.exe Token: SeSystemtimePrivilege 12272 wmic.exe Token: SeProfSingleProcessPrivilege 12272 wmic.exe Token: SeIncBasePriorityPrivilege 12272 wmic.exe Token: SeCreatePagefilePrivilege 12272 wmic.exe Token: SeBackupPrivilege 12272 wmic.exe Token: SeRestorePrivilege 12272 wmic.exe Token: SeShutdownPrivilege 12272 wmic.exe Token: SeDebugPrivilege 12272 wmic.exe Token: SeSystemEnvironmentPrivilege 12272 wmic.exe Token: SeRemoteShutdownPrivilege 12272 wmic.exe Token: SeUndockPrivilege 12272 wmic.exe Token: SeManageVolumePrivilege 12272 wmic.exe Token: 33 12272 wmic.exe Token: 34 12272 wmic.exe Token: 35 12272 wmic.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2520 wrote to memory of 2368 2520 svchost.exe 31 PID 2520 wrote to memory of 2368 2520 svchost.exe 31 PID 2520 wrote to memory of 2368 2520 svchost.exe 31 PID 2520 wrote to memory of 2936 2520 svchost.exe 32 PID 2520 wrote to memory of 2936 2520 svchost.exe 32 PID 2520 wrote to memory of 2936 2520 svchost.exe 32 PID 2520 wrote to memory of 2936 2520 svchost.exe 32 PID 2368 wrote to memory of 12272 2368 Payload.exe 33 PID 2368 wrote to memory of 12272 2368 Payload.exe 33 PID 2368 wrote to memory of 12272 2368 Payload.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Roaming\Payload.exe"C:\Users\Admin\AppData\Roaming\Payload.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:12272
-
-
-
C:\Users\Admin\AppData\Roaming\XClient.exe"C:\Users\Admin\AppData\Roaming\XClient.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD59d5f474cc6fd587802b7b140290be91f
SHA19d409c3cab7eb5c4d2c8f757cb000e9a33ea4d4f
SHA2566a8322ca1b56240e886c733f0092f962a059c0729f8069632701a4dad8eb9aa5
SHA512d702a4e564de4b6ad918a5d1e9a4dce28028bf1d583196b67377a67a576a612f86a0d0a1812233b8853faf6dfb162f58d628f13d12c044cf877aeec5ce42e0d5
-
Filesize
364KB
MD51f6e76213763de98666126aa0bc6b7a0
SHA1d38866afdc9485c053bb63b17348dc003b661ed9
SHA25605ac44c4fe768827e012d4ed73ce74180be394709dadec31144eb2a6f7ca576b
SHA5129f6fbabbeb52e4008783d3fea5b9e5883fbd2bb44042da722208b885a8118aa3604a2a47bfef0914690c05517de125f4e9e67028b1c1f1b685d1b2d9da9633e0