Overview
overview
10Static
static
10c7cf70e4f1...03.exe
windows7-x64
1c7cf70e4f1...03.exe
windows10-2004-x64
1c7cf7f1583...df.exe
windows7-x64
3c7cf7f1583...df.exe
windows10-2004-x64
3c7e0e2cc0b...a4.exe
windows7-x64
10c7e0e2cc0b...a4.exe
windows10-2004-x64
10c82cf03dc7...94.exe
windows7-x64
3c82cf03dc7...94.exe
windows10-2004-x64
3c82e8ca52a...ec.exe
windows7-x64
7c82e8ca52a...ec.exe
windows10-2004-x64
7c855759c0f...28.exe
windows7-x64
10c855759c0f...28.exe
windows10-2004-x64
10c870e41803...a5.exe
windows7-x64
10c870e41803...a5.exe
windows10-2004-x64
10c888e1de25...e1.exe
windows7-x64
10c888e1de25...e1.exe
windows10-2004-x64
10c8a241ce60...9d.exe
windows7-x64
6c8a241ce60...9d.exe
windows10-2004-x64
7c8b8a4b9ce...ee.exe
windows7-x64
10c8b8a4b9ce...ee.exe
windows10-2004-x64
10c8bdecaa93...15.exe
windows7-x64
10c8bdecaa93...15.exe
windows10-2004-x64
10c8e7700ee6...e9.exe
windows7-x64
10c8e7700ee6...e9.exe
windows10-2004-x64
10c91bc52cc5...0c.exe
windows7-x64
7c91bc52cc5...0c.exe
windows10-2004-x64
7c93d951c2f...12.exe
windows7-x64
10c93d951c2f...12.exe
windows10-2004-x64
10c949630c94...1f.exe
windows7-x64
7c949630c94...1f.exe
windows10-2004-x64
7c94fcbd3ca...a9.exe
windows7-x64
10c94fcbd3ca...a9.exe
windows10-2004-x64
10Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22/03/2025, 06:16
Behavioral task
behavioral1
Sample
c7cf70e4f1b3a0683850a99c3f6fac8461ad028ec9f90c79eb209fa3b566e103.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c7cf70e4f1b3a0683850a99c3f6fac8461ad028ec9f90c79eb209fa3b566e103.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
c7cf7f1583d461202a26e85770a8f15a8fd83a37d1f9d3a5ce8ee19a3b7efbdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
c7cf7f1583d461202a26e85770a8f15a8fd83a37d1f9d3a5ce8ee19a3b7efbdf.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
c82cf03dc74500d9c2a3451c0a01c7601f431b47003fe71220153f4734b83c94.exe
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
c82cf03dc74500d9c2a3451c0a01c7601f431b47003fe71220153f4734b83c94.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
c82e8ca52adaef2ad87a8f855739f4ec.exe
Resource
win7-20250207-en
Behavioral task
behavioral10
Sample
c82e8ca52adaef2ad87a8f855739f4ec.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
c855759c0f18039722a8c96ff1d7da64aa75aff9d72e254ae6a3f2de34c50428.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
c855759c0f18039722a8c96ff1d7da64aa75aff9d72e254ae6a3f2de34c50428.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
c870e41803c86f574d467de03b94d3a5.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
c870e41803c86f574d467de03b94d3a5.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
c888e1de25b9c34d74509d3ed5a918e1.exe
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
c888e1de25b9c34d74509d3ed5a918e1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
c8a241ce60ec6fd11993628cd54237d7a54831874afb79467ac1b52d6a236c9d.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
c8a241ce60ec6fd11993628cd54237d7a54831874afb79467ac1b52d6a236c9d.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
c8b8a4b9ce02eacd35169b19611d51762d5cb5de0b8fd57fb2188360e330e0ee.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
c8b8a4b9ce02eacd35169b19611d51762d5cb5de0b8fd57fb2188360e330e0ee.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral21
Sample
c8bdecaa93c4ace382df013284f7209d35750e0b3de6354b0ceeababbf192915.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
c8bdecaa93c4ace382df013284f7209d35750e0b3de6354b0ceeababbf192915.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
c8e7700ee69af8f70235a048b1b5b1e9.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
c8e7700ee69af8f70235a048b1b5b1e9.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
c91bc52cc51e01b3224c7a365654c1c5add7892e81432c964fd9fa8ac3c51e0c.exe
Resource
win7-20241023-en
Behavioral task
behavioral26
Sample
c91bc52cc51e01b3224c7a365654c1c5add7892e81432c964fd9fa8ac3c51e0c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
c93d951c2fb1c1505deb11e457ce4df9f4849181c8ba19c12bbb2b7066b18812.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
c93d951c2fb1c1505deb11e457ce4df9f4849181c8ba19c12bbb2b7066b18812.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
c949630c94733e122dc321316d68ca1f.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
c949630c94733e122dc321316d68ca1f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
c94fcbd3ca89723863a372a980b7dfcd5ee5ef7cd41042f6aaefd68e51f39ba9.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
c94fcbd3ca89723863a372a980b7dfcd5ee5ef7cd41042f6aaefd68e51f39ba9.exe
Resource
win10v2004-20250314-en
General
-
Target
c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe
-
Size
231KB
-
MD5
bdce93cd17613821526bc6ca459ed2e9
-
SHA1
a5ac6f6aaec918ef84e4229a14f7fa5e22a3125a
-
SHA256
c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4
-
SHA512
75f898555e2a3c82b87f94a6b0504869513309a7f386546b4b4f5c241fb311144eff19527e3fbbae38708189f28d28bb556a7441ecf7d8044cc382cc88cd6cb3
-
SSDEEP
6144:RloZMZrIkd8g+EtXHkv/iD4G17d5nsAvLOXZkQlz7b8e1mjGi:joZCL+EP8G17d5nsAvLOXZkQlTqr
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral5/memory/2160-1-0x0000000000280000-0x00000000002C0000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2688 powershell.exe 2140 powershell.exe 2720 powershell.exe 3008 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 8 discord.com 9 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 1908 wmic.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2688 powershell.exe 2720 powershell.exe 3008 powershell.exe 2008 powershell.exe 2140 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 2008 powershell.exe Token: SeIncreaseQuotaPrivilege 1160 wmic.exe Token: SeSecurityPrivilege 1160 wmic.exe Token: SeTakeOwnershipPrivilege 1160 wmic.exe Token: SeLoadDriverPrivilege 1160 wmic.exe Token: SeSystemProfilePrivilege 1160 wmic.exe Token: SeSystemtimePrivilege 1160 wmic.exe Token: SeProfSingleProcessPrivilege 1160 wmic.exe Token: SeIncBasePriorityPrivilege 1160 wmic.exe Token: SeCreatePagefilePrivilege 1160 wmic.exe Token: SeBackupPrivilege 1160 wmic.exe Token: SeRestorePrivilege 1160 wmic.exe Token: SeShutdownPrivilege 1160 wmic.exe Token: SeDebugPrivilege 1160 wmic.exe Token: SeSystemEnvironmentPrivilege 1160 wmic.exe Token: SeRemoteShutdownPrivilege 1160 wmic.exe Token: SeUndockPrivilege 1160 wmic.exe Token: SeManageVolumePrivilege 1160 wmic.exe Token: 33 1160 wmic.exe Token: 34 1160 wmic.exe Token: 35 1160 wmic.exe Token: SeIncreaseQuotaPrivilege 1160 wmic.exe Token: SeSecurityPrivilege 1160 wmic.exe Token: SeTakeOwnershipPrivilege 1160 wmic.exe Token: SeLoadDriverPrivilege 1160 wmic.exe Token: SeSystemProfilePrivilege 1160 wmic.exe Token: SeSystemtimePrivilege 1160 wmic.exe Token: SeProfSingleProcessPrivilege 1160 wmic.exe Token: SeIncBasePriorityPrivilege 1160 wmic.exe Token: SeCreatePagefilePrivilege 1160 wmic.exe Token: SeBackupPrivilege 1160 wmic.exe Token: SeRestorePrivilege 1160 wmic.exe Token: SeShutdownPrivilege 1160 wmic.exe Token: SeDebugPrivilege 1160 wmic.exe Token: SeSystemEnvironmentPrivilege 1160 wmic.exe Token: SeRemoteShutdownPrivilege 1160 wmic.exe Token: SeUndockPrivilege 1160 wmic.exe Token: SeManageVolumePrivilege 1160 wmic.exe Token: 33 1160 wmic.exe Token: 34 1160 wmic.exe Token: 35 1160 wmic.exe Token: SeIncreaseQuotaPrivilege 2260 wmic.exe Token: SeSecurityPrivilege 2260 wmic.exe Token: SeTakeOwnershipPrivilege 2260 wmic.exe Token: SeLoadDriverPrivilege 2260 wmic.exe Token: SeSystemProfilePrivilege 2260 wmic.exe Token: SeSystemtimePrivilege 2260 wmic.exe Token: SeProfSingleProcessPrivilege 2260 wmic.exe Token: SeIncBasePriorityPrivilege 2260 wmic.exe Token: SeCreatePagefilePrivilege 2260 wmic.exe Token: SeBackupPrivilege 2260 wmic.exe Token: SeRestorePrivilege 2260 wmic.exe Token: SeShutdownPrivilege 2260 wmic.exe Token: SeDebugPrivilege 2260 wmic.exe Token: SeSystemEnvironmentPrivilege 2260 wmic.exe Token: SeRemoteShutdownPrivilege 2260 wmic.exe Token: SeUndockPrivilege 2260 wmic.exe Token: SeManageVolumePrivilege 2260 wmic.exe Token: 33 2260 wmic.exe Token: 34 2260 wmic.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2688 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 30 PID 2160 wrote to memory of 2688 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 30 PID 2160 wrote to memory of 2688 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 30 PID 2160 wrote to memory of 2720 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 32 PID 2160 wrote to memory of 2720 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 32 PID 2160 wrote to memory of 2720 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 32 PID 2160 wrote to memory of 3008 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 34 PID 2160 wrote to memory of 3008 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 34 PID 2160 wrote to memory of 3008 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 34 PID 2160 wrote to memory of 2008 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 36 PID 2160 wrote to memory of 2008 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 36 PID 2160 wrote to memory of 2008 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 36 PID 2160 wrote to memory of 1160 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 38 PID 2160 wrote to memory of 1160 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 38 PID 2160 wrote to memory of 1160 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 38 PID 2160 wrote to memory of 2260 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 41 PID 2160 wrote to memory of 2260 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 41 PID 2160 wrote to memory of 2260 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 41 PID 2160 wrote to memory of 2860 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 43 PID 2160 wrote to memory of 2860 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 43 PID 2160 wrote to memory of 2860 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 43 PID 2160 wrote to memory of 2140 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 45 PID 2160 wrote to memory of 2140 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 45 PID 2160 wrote to memory of 2140 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 45 PID 2160 wrote to memory of 1908 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 47 PID 2160 wrote to memory of 1908 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 47 PID 2160 wrote to memory of 1908 2160 c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe"C:\Users\Admin\AppData\Local\Temp\c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\c7e0e2cc0be8b051458a1d381ce938a5916d17ca60fbe8b55c993d41be140aa4.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵PID:2860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
PID:1908
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54ba5a9c59a73ad44adfa0deab02aa55b
SHA1e011386710c77a7c3a18179047844f1c2b6f2af0
SHA256ff1d4f8b2b5e01e74f5507d0d9eccdf7cf1c3fa58f4222e21528689ede8c09f2
SHA512c2f0ba041017c0b9874043bb9c0d260745441389d49741d048a5ac862b5788a545e96659121a27e429921b7bfc31eefa2f0649517ff735717ed5dc4300f1fca7