Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 11:50

General

  • Target

    BootstrapperNew.exe

  • Size

    2.9MB

  • MD5

    a5da11e4a285848ae515180014f45b31

  • SHA1

    a9a3831a17d602f2aa1c2adf91328a1b639efe51

  • SHA256

    f3e50131ad394cee77a2f242e521a30662bbfb670a459e151fea8916ca0c9bfa

  • SHA512

    8d6bd11c484f967a79a9a5f07ed2e2fc5fba768e963de87d772fe1702a643f775641422f5399fa8a94e0c6ccaadfc7c690620fb72dfffb7e62d31aabbfb8a8ec

  • SSDEEP

    49152:8NRJ4Dffl1NvzVQi91k3oTiQ+j07CM3hJfUNeGU76VNHYYO6gpls53NMCHoX:iqDfHtzi41HTJ+j0OofUNW767zgplK

Malware Config

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:36623

fax-scenarios.gl.at.ply.gg:36623

Mutex

iq4Cbvqxc9yxmDW5

Attributes
  • Install_directory

    %AppData%

  • install_file

    svchost.exe

aes.plain

Extracted

Family

umbral

C2

https://discord.com/api/webhooks/1345563602677141726/UETQM4AWjNBFBxXdR-mv-F7ECuO_Z-OofyNnLI5dWrFHlsYv4cmGa1-zg2Y-OdxgVf3d

Signatures

  • Detect Umbral payload 2 IoCs
  • Detect Xworm Payload 2 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe
    "C:\Users\Admin\AppData\Local\Temp\BootstrapperNew.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Solara.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Solara.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe
        "C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe"
        3⤵
        • Executes dropped EXE
        PID:3512
      • C:\Users\Admin\AppData\Local\Temp\X.exe
        "C:\Users\Admin\AppData\Local\Temp\X.exe"
        3⤵
        • Checks computer location settings
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\X.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5000
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'X.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1044
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:432
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
          4⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4588
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\svchost.exe"
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1684
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" os get Caption
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2288
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" computersystem get totalphysicalmemory
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3188
      • C:\Windows\System32\Wbem\wmic.exe
        "wmic.exe" csproduct get uuid
        3⤵
          PID:3968
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
          3⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          PID:4244
        • C:\Windows\System32\Wbem\wmic.exe
          "wmic" path win32_VideoController get name
          3⤵
          • Detects videocard installed
          PID:4556
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
        PID:1684
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe
        1⤵
        • Executes dropped EXE
        PID:3736
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe
        1⤵
        • Executes dropped EXE
        PID:4404
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        C:\Users\Admin\AppData\Roaming\svchost.exe
        1⤵
        • Executes dropped EXE
        PID:2092

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        2KB

        MD5

        d85ba6ff808d9e5444a4b369f5bc2730

        SHA1

        31aa9d96590fff6981b315e0b391b575e4c0804a

        SHA256

        84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

        SHA512

        8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log

        Filesize

        654B

        MD5

        2ff39f6c7249774be85fd60a8f9a245e

        SHA1

        684ff36b31aedc1e587c8496c02722c6698c1c4e

        SHA256

        e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

        SHA512

        1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        948B

        MD5

        966914e2e771de7a4a57a95b6ecfa8a9

        SHA1

        7a32282fd51dd032967ed4d9a40cc57e265aeff2

        SHA256

        98d3c70d7004fa807897317bd6cd3e977b9b6c72d4d2565aca0f9f8b1c315cba

        SHA512

        dc39c7124a9c7c8d4c7e8e16290c46360b8d9a8f4e43edaacbbeb09bdcf20159a53db54d2b322372001b6a3de52b2f88e9088b5fdbc7638816ae0d122bb015f5

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        1KB

        MD5

        276798eeb29a49dc6e199768bc9c2e71

        SHA1

        5fdc8ccb897ac2df7476fbb07517aca5b7a6205b

        SHA256

        cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc

        SHA512

        0d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        36ce492590dae6a99dc720c4b441342d

        SHA1

        f33cf61dad0c21b77afa23e8288152dd51effeb3

        SHA256

        e049e9723cef24d71a65551cfbe9463e3ab6de1c9ac059511ae5f461a3becde5

        SHA512

        f291a68555f9970fe51f7dae052dfd5e2c01ff4ebb275d8a348bb7fcb6eb744fb3ce55006a850a9571ae8d0c5763f87ff1ce0f0f67e83794f4cc0056aa27935d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        e3161f4edbc9b963debe22e29658050b

        SHA1

        45dbf88dadafe5dd1cfee1e987c8a219d3208cdb

        SHA256

        1359d6daeaed2f254b162914203c891b23139cc236a3bf75c2dfcbe26265c84a

        SHA512

        006ffb8f37d1f77f8ee79b22ffa413819f565d62773c632b70985759572121c6ab4743139d16d885f8c0ff9d0e0b136686741728b3e142ee54aea3bb733dffb2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        34f595487e6bfd1d11c7de88ee50356a

        SHA1

        4caad088c15766cc0fa1f42009260e9a02f953bb

        SHA256

        0f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d

        SHA512

        10976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        944B

        MD5

        6d3e9c29fe44e90aae6ed30ccf799ca8

        SHA1

        c7974ef72264bbdf13a2793ccf1aed11bc565dce

        SHA256

        2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

        SHA512

        60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CONFIG

        Filesize

        79B

        MD5

        0284fa0391784125ad3b12be8c92c6ae

        SHA1

        e4fe938288c6804d9c79947ad2e39939a595e9f3

        SHA256

        789075b8c810f2b63f86dd1f8b7be836178ac679a32f2cb2376e013bc78c68c0

        SHA512

        9dd8db4e0017ae906e7c4178a54ea16f03aaba4c17658ed96fc384d2cd51f44c6e514872ba5c7e5f43131eb4d25c063531291d70dfab4422260585742a37e235

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Config.exe

        Filesize

        227KB

        MD5

        92ed19b045602f46a7a1d88d048f519b

        SHA1

        b4bf7b8bb5d19a3551df6b383673bc2ef6e016c2

        SHA256

        71c0b202ad4a6843d28d13c4bccbd22f12cf48a21e9a5676ce18c98e53e5dd7e

        SHA512

        d4ee42e54fdc19bbb0fa5e6243fbd6f3c2d7c69e26826940a9dc2ff01c23f35d3ceb6f50a3f3b0dd9c565b4a336bd8c08aba4e37133bc2819a5007df7c7b0b59

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Solara.exe

        Filesize

        2.9MB

        MD5

        b48a98cac04ccfc5a1d2fba3afd546d7

        SHA1

        3bdacc3f96359cde0de585973529af246ecb1501

        SHA256

        a54874c76aeca3adbea14c50b07ffa3a5703fa021af7e02d130c980889b40ce7

        SHA512

        818d4c934ab9a5138c2cf74a0c638bec7fef552431fcd54c595a387f1d57703c3a5c4c5e11d5f95436728cb136743a3711bc0201344b5896ea1339ec73f849ee

      • C:\Users\Admin\AppData\Local\Temp\SolaraNew.exe

        Filesize

        2.9MB

        MD5

        f227cdfd423b3cc03bb69c49babf4da3

        SHA1

        3db5a97d9b0f2545e7ba97026af6c28512200441

        SHA256

        cb5d6c1ca0aa6232a2d55e14b20ac4a9945a0bd063c57d60a5ed3ae94160e3e8

        SHA512

        b10afd03b02a928545c16fad39a6ae46b68b1e1a2477a6990803ce80008e7161fb2ebc9380ba15a1b074bb436aa34bcd6c94a922933d438b1c22489717e1e10e

      • C:\Users\Admin\AppData\Local\Temp\X.exe

        Filesize

        44KB

        MD5

        d8dec448ddbb0749bbe3f4259c9bc29b

        SHA1

        93886a2b1c55fa6ff41ac5bce6945e601d355f8c

        SHA256

        56ef629323495497970ffe5efd4c3197bd8043825ba264b9e6294113675820ac

        SHA512

        20739296d87d15b801086a8e7478875722e83dc1fd4004e9905a1c6f8c0c8913644bcf7e5b7aecb760f4870354118fc10d218f952fcd7b204c1f0ebae4e4a400

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aupijyka.2j5.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/2144-33-0x00000000000C0000-0x00000000000D2000-memory.dmp

        Filesize

        72KB

      • memory/2144-194-0x000000001AAC0000-0x000000001AACC000-memory.dmp

        Filesize

        48KB

      • memory/3512-39-0x00007FFDC62D0000-0x00007FFDC6D91000-memory.dmp

        Filesize

        10.8MB

      • memory/3512-61-0x0000029AFE960000-0x0000029AFE968000-memory.dmp

        Filesize

        32KB

      • memory/3512-57-0x0000029AFD620000-0x0000029AFD628000-memory.dmp

        Filesize

        32KB

      • memory/3512-58-0x0000029AFE930000-0x0000029AFE946000-memory.dmp

        Filesize

        88KB

      • memory/3512-59-0x0000029AFD610000-0x0000029AFD61A000-memory.dmp

        Filesize

        40KB

      • memory/3512-56-0x0000029AFD5E0000-0x0000029AFD606000-memory.dmp

        Filesize

        152KB

      • memory/3512-52-0x0000029AFD5A0000-0x0000029AFD5D8000-memory.dmp

        Filesize

        224KB

      • memory/3512-41-0x0000029AFD520000-0x0000029AFD528000-memory.dmp

        Filesize

        32KB

      • memory/3512-60-0x0000029AFD590000-0x0000029AFD59A000-memory.dmp

        Filesize

        40KB

      • memory/3512-53-0x0000029AFD570000-0x0000029AFD57E000-memory.dmp

        Filesize

        56KB

      • memory/3512-54-0x0000029AFE830000-0x0000029AFE930000-memory.dmp

        Filesize

        1024KB

      • memory/3512-192-0x00007FFDC62D0000-0x00007FFDC6D91000-memory.dmp

        Filesize

        10.8MB

      • memory/3512-35-0x0000029AF5870000-0x0000029AF5B52000-memory.dmp

        Filesize

        2.9MB

      • memory/3512-55-0x0000029AFD580000-0x0000029AFD58A000-memory.dmp

        Filesize

        40KB

      • memory/3512-40-0x0000029AF7750000-0x0000029AF7760000-memory.dmp

        Filesize

        64KB

      • memory/3908-0-0x0000000140000000-0x00000001402F9000-memory.dmp

        Filesize

        3.0MB

      • memory/3908-189-0x0000000140000000-0x00000001402F9000-memory.dmp

        Filesize

        3.0MB

      • memory/4104-51-0x000002324FDB0000-0x000002324FDD2000-memory.dmp

        Filesize

        136KB

      • memory/4304-9-0x0000000000360000-0x0000000000652000-memory.dmp

        Filesize

        2.9MB

      • memory/4304-8-0x00007FFDC62D3000-0x00007FFDC62D5000-memory.dmp

        Filesize

        8KB

      • memory/4924-140-0x00000234ED5C0000-0x00000234ED5CA000-memory.dmp

        Filesize

        40KB

      • memory/4924-141-0x00000234EF820000-0x00000234EF832000-memory.dmp

        Filesize

        72KB

      • memory/4924-81-0x00000234ED580000-0x00000234ED59E000-memory.dmp

        Filesize

        120KB

      • memory/4924-38-0x00000234ED0C0000-0x00000234ED100000-memory.dmp

        Filesize

        256KB

      • memory/4924-80-0x00000234EEE90000-0x00000234EEEE0000-memory.dmp

        Filesize

        320KB

      • memory/4924-79-0x00000234EF8A0000-0x00000234EF916000-memory.dmp

        Filesize

        472KB