Analysis

  • max time kernel
    63s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2025, 22:17

General

  • Target

    Umbral.payload.exe

  • Size

    251KB

  • MD5

    ef87753af737c85eeabce72fde0da5aa

  • SHA1

    f0cb6e32cc64a387327be0ac866b982533d5379e

  • SHA256

    e7a1844712215b50f6c0f6dcf08c0170a32ed31c6973f133cbb24e3daaaae909

  • SHA512

    c3451ade161351ec4199f741003c309697fd70210324c49dae5070cc286677c7805ceb81dae486f05ea49ca5b5dd8fee75626250d49b467c2b7218048609c580

  • SSDEEP

    6144:gaGu0riMfnHBTD7nEW4uDMgPHLZtIq4aP+Z8e9iLD:gaGuOpfnHBTDL4UN6Moi

Score
10/10

Malware Config

Signatures

  • Detect Umbral payload 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Umbral.payload.exe
    "C:\Users\Admin\AppData\Local\Temp\Umbral.payload.exe"
    1⤵
      PID:1780
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4792
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:2156

      Network

      MITRE ATT&CK Enterprise v16

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1780-1-0x00000223F10E0000-0x00000223F1124000-memory.dmp

        Filesize

        272KB

      • memory/1780-0-0x00007FF986C93000-0x00007FF986C95000-memory.dmp

        Filesize

        8KB

      • memory/1780-2-0x00007FF986C90000-0x00007FF987751000-memory.dmp

        Filesize

        10.8MB

      • memory/1780-3-0x00007FF986C90000-0x00007FF987751000-memory.dmp

        Filesize

        10.8MB

      • memory/4792-5-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-6-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-4-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-10-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-16-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-15-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-14-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-13-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-12-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB

      • memory/4792-11-0x0000016394860000-0x0000016394861000-memory.dmp

        Filesize

        4KB