Analysis
-
max time kernel
106s -
max time network
142s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
23/03/2025, 19:13
General
-
Target
Umbral.exe
-
Size
228KB
-
MD5
e8c01c0574c522af2bbc4fc6dd53142f
-
SHA1
0b1ee816c4324d7db00842451c8759e91cfddab3
-
SHA256
bd70c0afeae8898be7749a6078f44829d655bbabaebfbe6b4ef8286ad410f65d
-
SHA512
2d800b808ae65e9900e9d21b82ddcafe9b4c066514bf23ebb43de1f62da13d0cd6fa09de2a8e81388712a72fa999ef201281b7c9e698d33a33a9fa93e3a6e08b
-
SSDEEP
6144:OloZMHrIkd8g+EtXHkv/iD4VRCamkrHMZ9YW3X23fQb8e1mS/i:YoZIL+EP8VRCamkrHMZ9YW3X2A+
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/3364-1-0x00000202BE220000-0x00000202BE260000-memory.dmp family_umbral -
Umbral family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1612 powershell.exe 1892 powershell.exe 5004 powershell.exe 5108 powershell.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 discord.com 21 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3556 wmic.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1612 powershell.exe 1612 powershell.exe 1892 powershell.exe 1892 powershell.exe 5004 powershell.exe 5004 powershell.exe 2180 powershell.exe 2180 powershell.exe 3964 wmic.exe 3964 wmic.exe 3964 wmic.exe 3964 wmic.exe 4212 wmic.exe 4212 wmic.exe 4212 wmic.exe 4212 wmic.exe 1996 wmic.exe 1996 wmic.exe 1996 wmic.exe 1996 wmic.exe 5108 powershell.exe 5108 powershell.exe 3556 wmic.exe 3556 wmic.exe 3556 wmic.exe 3556 wmic.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3364 Umbral.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeIncreaseQuotaPrivilege 1612 powershell.exe Token: SeSecurityPrivilege 1612 powershell.exe Token: SeTakeOwnershipPrivilege 1612 powershell.exe Token: SeLoadDriverPrivilege 1612 powershell.exe Token: SeSystemProfilePrivilege 1612 powershell.exe Token: SeSystemtimePrivilege 1612 powershell.exe Token: SeProfSingleProcessPrivilege 1612 powershell.exe Token: SeIncBasePriorityPrivilege 1612 powershell.exe Token: SeCreatePagefilePrivilege 1612 powershell.exe Token: SeBackupPrivilege 1612 powershell.exe Token: SeRestorePrivilege 1612 powershell.exe Token: SeShutdownPrivilege 1612 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe Token: SeSystemEnvironmentPrivilege 1612 powershell.exe Token: SeRemoteShutdownPrivilege 1612 powershell.exe Token: SeUndockPrivilege 1612 powershell.exe Token: SeManageVolumePrivilege 1612 powershell.exe Token: 33 1612 powershell.exe Token: 34 1612 powershell.exe Token: 35 1612 powershell.exe Token: 36 1612 powershell.exe Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 5004 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeIncreaseQuotaPrivilege 3964 wmic.exe Token: SeSecurityPrivilege 3964 wmic.exe Token: SeTakeOwnershipPrivilege 3964 wmic.exe Token: SeLoadDriverPrivilege 3964 wmic.exe Token: SeSystemProfilePrivilege 3964 wmic.exe Token: SeSystemtimePrivilege 3964 wmic.exe Token: SeProfSingleProcessPrivilege 3964 wmic.exe Token: SeIncBasePriorityPrivilege 3964 wmic.exe Token: SeCreatePagefilePrivilege 3964 wmic.exe Token: SeBackupPrivilege 3964 wmic.exe Token: SeRestorePrivilege 3964 wmic.exe Token: SeShutdownPrivilege 3964 wmic.exe Token: SeDebugPrivilege 3964 wmic.exe Token: SeSystemEnvironmentPrivilege 3964 wmic.exe Token: SeRemoteShutdownPrivilege 3964 wmic.exe Token: SeUndockPrivilege 3964 wmic.exe Token: SeManageVolumePrivilege 3964 wmic.exe Token: 33 3964 wmic.exe Token: 34 3964 wmic.exe Token: 35 3964 wmic.exe Token: 36 3964 wmic.exe Token: SeIncreaseQuotaPrivilege 3964 wmic.exe Token: SeSecurityPrivilege 3964 wmic.exe Token: SeTakeOwnershipPrivilege 3964 wmic.exe Token: SeLoadDriverPrivilege 3964 wmic.exe Token: SeSystemProfilePrivilege 3964 wmic.exe Token: SeSystemtimePrivilege 3964 wmic.exe Token: SeProfSingleProcessPrivilege 3964 wmic.exe Token: SeIncBasePriorityPrivilege 3964 wmic.exe Token: SeCreatePagefilePrivilege 3964 wmic.exe Token: SeBackupPrivilege 3964 wmic.exe Token: SeRestorePrivilege 3964 wmic.exe Token: SeShutdownPrivilege 3964 wmic.exe Token: SeDebugPrivilege 3964 wmic.exe Token: SeSystemEnvironmentPrivilege 3964 wmic.exe Token: SeRemoteShutdownPrivilege 3964 wmic.exe Token: SeUndockPrivilege 3964 wmic.exe Token: SeManageVolumePrivilege 3964 wmic.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3364 wrote to memory of 1612 3364 Umbral.exe 82 PID 3364 wrote to memory of 1612 3364 Umbral.exe 82 PID 3364 wrote to memory of 1892 3364 Umbral.exe 87 PID 3364 wrote to memory of 1892 3364 Umbral.exe 87 PID 3364 wrote to memory of 5004 3364 Umbral.exe 91 PID 3364 wrote to memory of 5004 3364 Umbral.exe 91 PID 3364 wrote to memory of 2180 3364 Umbral.exe 93 PID 3364 wrote to memory of 2180 3364 Umbral.exe 93 PID 3364 wrote to memory of 3964 3364 Umbral.exe 95 PID 3364 wrote to memory of 3964 3364 Umbral.exe 95 PID 3364 wrote to memory of 4212 3364 Umbral.exe 98 PID 3364 wrote to memory of 4212 3364 Umbral.exe 98 PID 3364 wrote to memory of 1996 3364 Umbral.exe 100 PID 3364 wrote to memory of 1996 3364 Umbral.exe 100 PID 3364 wrote to memory of 5108 3364 Umbral.exe 102 PID 3364 wrote to memory of 5108 3364 Umbral.exe 102 PID 3364 wrote to memory of 3556 3364 Umbral.exe 104 PID 3364 wrote to memory of 3556 3364 Umbral.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 22⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2180
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name2⤵
- Detects videocard installed
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5c285fc8c9c2d261304554d2d9722be0a
SHA14adba3127d6b5010e27e54e7ca5faae4de349673
SHA256a6e5951ec501a71aaee0735f54095f8abd84d80b84f1a638a7a4e661383b4257
SHA51228a8d77fdf0d53a0ff9f7e025e6e75787aab8173ddbf6323d8a1921e615b605afaafcd6d294e6a8f6e76d19408c5cffada0f19cf911899f648bda46ae9b8b9aa
-
Filesize
948B
MD5cd4e1330b55d633a92e6a831f06fb4ef
SHA1b06925fba40584f8d8864a13b71828a33dd40051
SHA256c563e52f15c87dd1caeda1df794ea23f65878dca4e12aec2787e70bc6a519942
SHA5128a822e934596798eaa3b35cea47291c8ca275639ff818dceab28d12124614fd245ccdb4d94d868484c18325c8c4412f7614369847817c10512d91e7b93d90139
-
Filesize
1KB
MD58e1fdd1b66d2fee9f6a052524d4ddca5
SHA10a9d0994559d1be2eecd8b0d6960540ca627bdb6
SHA2564cc7c1b79d1b48582d4dc27ca8c31457b9bf2441deb7914399bb9e6863f18b13
SHA5125a5494b878b08e8515811ab7a3d68780dac7423f5562477d98249a8bedf7ec98567b7cd5d4c6967d6bc63f2d6d9b7da9a65e0eb29d4b955026b469b5b598d1f3
-
Filesize
1KB
MD586b2bb0c97f174f24adbb25cbff90a71
SHA19df68dbc738dc183b08d63bd25c5d0a883d0a5b2
SHA256af0c4aa98ccbd73aff9e0dfdbb4711e11c021c87bcfaff105535f7289b02757d
SHA512ac4093423486d4efd54a82e7997aa5a0a506d47deeb147efc63a8148d1e560b5b77b9ddf53e2b673ca516027f7805389c717278a9b56a2d6a37bf6f6df4e4500
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82