Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    107s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:12

General

  • Target

    6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe

  • Size

    229KB

  • MD5

    c43fa6e8e418363f5b9bd2bac94e03ac

  • SHA1

    4e557326d845f150c37e71d23f2e816942f6f53c

  • SHA256

    6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867

  • SHA512

    1535626a7d98e33546f04623c7a405ded146a273422934d47c15f6862dc988212776b27270cf25434704dbf31a22dea5049e0b735b1861645e54510aa1f103ac

  • SSDEEP

    6144:lloZM+rIkd8g+EtXHkv/iD4qCslEKtFucr20VJgqAb8e1mND8i:noZtL+EP8qCslEKtFucr20VJgDYx

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe
    "C:\Users\Admin\AppData\Local\Temp\6bcf96280909b8139cf7fb517241d0b12c45f7fa2f1681cb7bc9caac33ef5867.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3460
    • C:\Windows\System32\Wbem\wmic.exe
      "wmic.exe" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4064

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3460-0-0x00007FFE97B53000-0x00007FFE97B55000-memory.dmp

    Filesize

    8KB

  • memory/3460-1-0x0000020D3E9E0000-0x0000020D3EA20000-memory.dmp

    Filesize

    256KB

  • memory/3460-2-0x00007FFE97B50000-0x00007FFE98611000-memory.dmp

    Filesize

    10.8MB

  • memory/3460-4-0x00007FFE97B50000-0x00007FFE98611000-memory.dmp

    Filesize

    10.8MB