Analysis
-
max time kernel
91s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 11:16
General
-
Target
Everything-1.4.1.1026.x64-Setup2.exe
-
Size
468KB
-
MD5
53e560338b0fabac1c89e7baf950046d
-
SHA1
517c82342d0e5ee0a581ff0db0e543c9cb9986a4
-
SHA256
c9d2459c5bd3e5044d4d625f92e30bfa475e11fe259fc00c0d4961f5ebe10f3b
-
SHA512
4216abf6d385c3f37889300dd9c8ec98215e7f8810806b2a306cd6e79747c720972b74026917ed5cc9a07e8c677aed2ad2ffc509290853eaa0ec4bc807a3843d
-
SSDEEP
12288:hGePVle8y4TKs/u6oZtL+EP855eLcCFdW8j+ctBIX0B:oITKoI8XeLcCFdW8j+ctBIXo
Malware Config
Extracted
umbral
https://discord.com/api/webhooks/1360210646112665720/qXg1qF4JZ6j3Rqqts-_rZSbjGedO1RuAq7HLooe-TstGKKIib9a91A7sjYj3Xa-Dhtsc
Signatures
-
Detect Umbral payload 3 IoCs
resource yara_rule behavioral1/files/0x000800000002427b-23.dat family_umbral behavioral1/memory/5024-25-0x000001ED38E60000-0x000001ED38EA0000-memory.dmp family_umbral behavioral1/memory/2424-24-0x0000000000400000-0x000000000047C000-memory.dmp family_umbral -
Umbral family
-
pid Process 636 powershell.exe 2216 powershell.exe 4892 powershell.exe 404 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts Umbral.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027557611-1484967174-339164627-1000\Control Panel\International\Geo\Nation Everything-1.4.1.1026.x64-Setup2.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Executes dropped EXE 2 IoCs
pid Process 5580 Client.exe 5024 Umbral.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 24 discord.com 27 pastebin.com 28 pastebin.com 23 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com 36 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Everything-1.4.1.1026.x64-Setup2.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 820 cmd.exe 2484 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 3584 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2484 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe 5556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 5024 Umbral.exe 404 powershell.exe 404 powershell.exe 4892 powershell.exe 4892 powershell.exe 636 powershell.exe 636 powershell.exe 3748 powershell.exe 3748 powershell.exe 2216 powershell.exe 2216 powershell.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe 5580 Client.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5580 Client.exe Token: SeDebugPrivilege 5024 Umbral.exe Token: SeIncreaseQuotaPrivilege 4408 wmic.exe Token: SeSecurityPrivilege 4408 wmic.exe Token: SeTakeOwnershipPrivilege 4408 wmic.exe Token: SeLoadDriverPrivilege 4408 wmic.exe Token: SeSystemProfilePrivilege 4408 wmic.exe Token: SeSystemtimePrivilege 4408 wmic.exe Token: SeProfSingleProcessPrivilege 4408 wmic.exe Token: SeIncBasePriorityPrivilege 4408 wmic.exe Token: SeCreatePagefilePrivilege 4408 wmic.exe Token: SeBackupPrivilege 4408 wmic.exe Token: SeRestorePrivilege 4408 wmic.exe Token: SeShutdownPrivilege 4408 wmic.exe Token: SeDebugPrivilege 4408 wmic.exe Token: SeSystemEnvironmentPrivilege 4408 wmic.exe Token: SeRemoteShutdownPrivilege 4408 wmic.exe Token: SeUndockPrivilege 4408 wmic.exe Token: SeManageVolumePrivilege 4408 wmic.exe Token: 33 4408 wmic.exe Token: 34 4408 wmic.exe Token: 35 4408 wmic.exe Token: 36 4408 wmic.exe Token: SeIncreaseQuotaPrivilege 4408 wmic.exe Token: SeSecurityPrivilege 4408 wmic.exe Token: SeTakeOwnershipPrivilege 4408 wmic.exe Token: SeLoadDriverPrivilege 4408 wmic.exe Token: SeSystemProfilePrivilege 4408 wmic.exe Token: SeSystemtimePrivilege 4408 wmic.exe Token: SeProfSingleProcessPrivilege 4408 wmic.exe Token: SeIncBasePriorityPrivilege 4408 wmic.exe Token: SeCreatePagefilePrivilege 4408 wmic.exe Token: SeBackupPrivilege 4408 wmic.exe Token: SeRestorePrivilege 4408 wmic.exe Token: SeShutdownPrivilege 4408 wmic.exe Token: SeDebugPrivilege 4408 wmic.exe Token: SeSystemEnvironmentPrivilege 4408 wmic.exe Token: SeRemoteShutdownPrivilege 4408 wmic.exe Token: SeUndockPrivilege 4408 wmic.exe Token: SeManageVolumePrivilege 4408 wmic.exe Token: 33 4408 wmic.exe Token: 34 4408 wmic.exe Token: 35 4408 wmic.exe Token: 36 4408 wmic.exe Token: SeDebugPrivilege 404 powershell.exe Token: SeDebugPrivilege 4892 powershell.exe Token: SeDebugPrivilege 636 powershell.exe Token: SeDebugPrivilege 3748 powershell.exe Token: SeIncreaseQuotaPrivilege 5884 wmic.exe Token: SeSecurityPrivilege 5884 wmic.exe Token: SeTakeOwnershipPrivilege 5884 wmic.exe Token: SeLoadDriverPrivilege 5884 wmic.exe Token: SeSystemProfilePrivilege 5884 wmic.exe Token: SeSystemtimePrivilege 5884 wmic.exe Token: SeProfSingleProcessPrivilege 5884 wmic.exe Token: SeIncBasePriorityPrivilege 5884 wmic.exe Token: SeCreatePagefilePrivilege 5884 wmic.exe Token: SeBackupPrivilege 5884 wmic.exe Token: SeRestorePrivilege 5884 wmic.exe Token: SeShutdownPrivilege 5884 wmic.exe Token: SeDebugPrivilege 5884 wmic.exe Token: SeSystemEnvironmentPrivilege 5884 wmic.exe Token: SeRemoteShutdownPrivilege 5884 wmic.exe Token: SeUndockPrivilege 5884 wmic.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2424 wrote to memory of 5580 2424 Everything-1.4.1.1026.x64-Setup2.exe 85 PID 2424 wrote to memory of 5580 2424 Everything-1.4.1.1026.x64-Setup2.exe 85 PID 2424 wrote to memory of 5024 2424 Everything-1.4.1.1026.x64-Setup2.exe 86 PID 2424 wrote to memory of 5024 2424 Everything-1.4.1.1026.x64-Setup2.exe 86 PID 5024 wrote to memory of 4408 5024 Umbral.exe 88 PID 5024 wrote to memory of 4408 5024 Umbral.exe 88 PID 5024 wrote to memory of 4984 5024 Umbral.exe 91 PID 5024 wrote to memory of 4984 5024 Umbral.exe 91 PID 5024 wrote to memory of 404 5024 Umbral.exe 93 PID 5024 wrote to memory of 404 5024 Umbral.exe 93 PID 5024 wrote to memory of 4892 5024 Umbral.exe 95 PID 5024 wrote to memory of 4892 5024 Umbral.exe 95 PID 5024 wrote to memory of 636 5024 Umbral.exe 97 PID 5024 wrote to memory of 636 5024 Umbral.exe 97 PID 5024 wrote to memory of 3748 5024 Umbral.exe 99 PID 5024 wrote to memory of 3748 5024 Umbral.exe 99 PID 5024 wrote to memory of 5884 5024 Umbral.exe 102 PID 5024 wrote to memory of 5884 5024 Umbral.exe 102 PID 5024 wrote to memory of 1100 5024 Umbral.exe 104 PID 5024 wrote to memory of 1100 5024 Umbral.exe 104 PID 5024 wrote to memory of 3648 5024 Umbral.exe 106 PID 5024 wrote to memory of 3648 5024 Umbral.exe 106 PID 5024 wrote to memory of 2216 5024 Umbral.exe 108 PID 5024 wrote to memory of 2216 5024 Umbral.exe 108 PID 5024 wrote to memory of 3584 5024 Umbral.exe 110 PID 5024 wrote to memory of 3584 5024 Umbral.exe 110 PID 5024 wrote to memory of 820 5024 Umbral.exe 115 PID 5024 wrote to memory of 820 5024 Umbral.exe 115 PID 820 wrote to memory of 2484 820 cmd.exe 117 PID 820 wrote to memory of 2484 820 cmd.exe 117 PID 5580 wrote to memory of 5164 5580 Client.exe 119 PID 5580 wrote to memory of 5164 5580 Client.exe 119 PID 5164 wrote to memory of 1848 5164 CMD.exe 121 PID 5164 wrote to memory of 1848 5164 CMD.exe 121 PID 5580 wrote to memory of 3144 5580 Client.exe 122 PID 5580 wrote to memory of 3144 5580 Client.exe 122 PID 3144 wrote to memory of 5556 3144 CMD.exe 124 PID 3144 wrote to memory of 5556 3144 CMD.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4984 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Everything-1.4.1.1026.x64-Setup2.exe"C:\Users\Admin\AppData\Local\Temp\Everything-1.4.1.1026.x64-Setup2.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5580 -
C:\Windows\SYSTEM32\CMD.exe"CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Security Essentials" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdAudacity.exe" & exit3⤵
- Suspicious use of WriteProcessMemory
PID:5164 -
C:\Windows\system32\schtasks.exeSchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "Microsoft Security Essentials" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdAudacity.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1848
-
-
-
C:\Windows\SYSTEM32\CMD.exe"CMD" /c SchTaSKs /create /f /sc minute /mo -1 /tn "Adobe Photoshop Upgrade" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdAudacity.exe" /RL HIGHEST & exit3⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\system32\schtasks.exeSchTaSKs /create /f /sc minute /mo -1 /tn "Adobe Photoshop Upgrade" /tr "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\xdwdAudacity.exe" /RL HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:5556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Umbral.exe"C:\Users\Admin\AppData\Local\Temp\Umbral.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SYSTEM32\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"3⤵
- Views/modifies file attributes
PID:4984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵PID:1100
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵PID:3648
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Windows\System32\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- Detects videocard installed
PID:3584
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\system32\PING.EXEping localhost4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2484
-
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4408
Network
MITRE ATT&CK Enterprise v16
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5547df619456b0e94d1b7663cf2f93ccb
SHA18807c99005eaf2cc44b0b5ec4fc6eac289bfb4e3
SHA2568b7130cc966f3f78e236b4e51eb12e1c82b0bd3f0773275d619b5c545168797a
SHA51201b4e32fdf6c7f2347075c8153bc75a2f32fe3cec19e1a777e263ec4f607b54e046f0e4c7c0bc22581d44cbbdbb076a63eaa50a742f381faad06c86c2b10f67f
-
Filesize
1KB
MD5ca58d1913d3261f116a299095e04f734
SHA1941d13d0c8c65adb6513f23991acfa0d62facdea
SHA256755daf72f2f5e983abb009c3b1eef4c7c660999f5ff581545bbcae7088c17c69
SHA51287b0d8c9a5348235e9ad6416e09665764db1af408bf763857dc40e39411fa0cf405e3e8b9f0b8540c72aa874059d1dee865aa0cff8dba0fde5779ec9480b5e40
-
Filesize
64B
MD5a67eee085e8f68aaffbfdb51503d6561
SHA129db9b41945c6a5d27d5836a1c780668eded65a0
SHA2566e155bcc98f4e175a8701f030b73b14d9002b175ef58a19cb9010af3964e36b4
SHA5127923bc74260e77d62b20cf510b79e0422563469ec3543084a989db154b1e39370f1a6e6c6e73caa7471d0974a693b1beb4fd2ddfb14b0b5c58650b5df3c32d81
-
Filesize
944B
MD58a0407fd3b6a0e95729793e05880b558
SHA1c704aff8e50b66cc5e7eaa51fe8fa41b0ef76ab6
SHA256d641339de65c0d9ffd34a706fa9fcf408f2da61bdedf37fddad0ae9c8654e23e
SHA512a8cf10aa0ad92bb7a6dc4da5d8445bd2482864612071f525b3d0da92357dad56c1a690f8755e2dc138c044387871cdf8a3af6493af8bfbb2e34214eb809a0f72
-
Filesize
948B
MD574a6b79d36b4aae8b027a218bc6e1af7
SHA10350e46c1df6934903c4820a00b0bc4721779e5f
SHA25660c64f6803d7ad1408d0a8628100470859b16ef332d5f1bd8bb2debe51251d04
SHA51260e71435a9a23f4c144d641844f4182ddc9aa4ccd3e99232149a187112dce96458aab9587e9fea46f5dc5a52f5ca758969a04657a2b5b10241d3e4554f7c85e0
-
Filesize
1KB
MD5e89e026fcbcb7b88a5e080df5235666c
SHA1ba561c7bbb4aa29c2ce371b92a8030fea9581a62
SHA2565a3e6ec763e3776523705ccf199692732a2aa18cab534b697dd6a31f2a2c3810
SHA512f6ead5af3d55a72bba21a31d7e08965568be250eacbb39df2963d0cfa5f6b64a175738ed962828e656e421739db2c33f936abdcb9c3bee06ef8a95ef7456c185
-
Filesize
228KB
MD59d13457fe2154ed1c7c5d080b4e89d75
SHA1813a1143530624a7ebb51eb041d8ab1b1349c428
SHA2564433cbb68bb1948a9093af9d3e4ca43dd9d2e8ab1eb4ef172c84a18122211dbb
SHA5124665ce02912a5d27a847b91fc7dc1a1cd215febe16fa2bd9d90694a9ce45d5475255cdd0d9e2d57c00b61bbdd94ffce6e71227d04530544591043216be48341b
-
Filesize
231KB
MD5e4b51d29d135168fc262065999c10f6a
SHA18f7d8872ee04c47af338ea0fe8480a3e5be2d6bb
SHA25672717c89182aa16055fca98ccb899f86084a888681cd5621dcdba99d08056c7c
SHA512d539a85bdbd0bcaa52ed8483d124f61875eb1b28d5bd353087eee1332efd3bf948fcd672e77b06755ccb4af7c1783db87091d99f78da41f12f8187fd22927fb6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82