Analysis

  • max time kernel
    134s
  • max time network
    126s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 23:29

General

  • Target

    Furk Ultra v2.1.4a/FurkUltra.exe

  • Size

    954KB

  • MD5

    cd61d747b15f294b459b9aff9f1d0275

  • SHA1

    43979ecebeab2ca0c2dd3ec31a0a1d707fa3fb87

  • SHA256

    9a98956f690fcb25be546bbf9c3c62eaea19b0166aee2bf2f63b979e65b3fa5b

  • SHA512

    ea039181a851d6f2bc49b1bfcf4482f9a5ec4b37a1d2845606b4baa07284e5846620e8c576f6a95fe0d8dc47ba25553b1a81c029f7449286ba50daa5ab4464f5

  • SSDEEP

    12288:XKljabtvyU7RBv4XpnMQ9Nx3Ug+YL4UIHDPJKDbn2mFX1WpZOVXfTpU4n81yyUF:XK+UUbG9zE5YLv29K+mFX1WLkbpUPyV

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Furk Ultra v2.1.4a\FurkUltra.exe
    "C:\Users\Admin\AppData\Local\Temp\Furk Ultra v2.1.4a\FurkUltra.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4600
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4500
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:2840
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4660
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:704
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1416
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:3272
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    f7dcb24540769805e5bb30d193944dce

    SHA1

    e26c583c562293356794937d9e2e6155d15449ee

    SHA256

    6b88c6ac55bbd6fea0ebe5a760d1ad2cfce251c59d0151a1400701cb927e36ea

    SHA512

    cb5ad678b0ef642bf492f32079fe77e8be20c02de267f04b545df346b25f3e4eb98bb568c4c2c483bb88f7d1826863cb515b570d620766e52476c8ee2931ea94

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\6FGHNCOX\edgecompatviewlist[1].xml

    Filesize

    74KB

    MD5

    d4fc49dc14f63895d997fa4940f24378

    SHA1

    3efb1437a7c5e46034147cbbc8db017c69d02c31

    SHA256

    853d2f4eb81c9fdcea2ee079f6faf98214b111b77cdf68709b38989d123890f1

    SHA512

    cc60d79b4afe5007634ac21dc4bc92081880be4c0d798a1735b63b27e936c02f399964f744dc73711987f01e8a1064b02a4867dd6cac27538e5fbe275cc61e0a

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6SI6PY1Z\3b1Q3-2ktxseIVt-HK-LDpEKRyl8KDIxhU6os0UJEUg[1].js

    Filesize

    36KB

    MD5

    3000fc1d261592ef758622670fc1befd

    SHA1

    cc364035ea7b93742ddea916f09b5a99f7a117fe

    SHA256

    ddbd50dfeda4b71b1e215b7e1caf8b0e910a47297c283231854ea8b345091148

    SHA512

    6c2e9d68ac25462023e5c4a7603328e4bc5600d95aa482b241aa600e906123cc988c29156f7adf165de77eed3273d405796aa61258d52de63fdd624ca0e6b4ce

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\6SI6PY1Z\f[2].txt

    Filesize

    163KB

    MD5

    08708acfd538af41176ec0bd429e8416

    SHA1

    dce490e88c30d879154f449218645bf0474c0edb

    SHA256

    89c6faa34d1dec59103d4dc79addfbd9ba02e30d702dd04c0d4599fe774bd8d5

    SHA512

    10e1a638f87508ba45d04a3f581a65ed534e118a3142a5c3071accc1c60fef0d6af7c097f20009c56583e62e5cd314cd479b326cdceb9fff8b0a1d5f15094037

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\AC6JR31I\f[4].txt

    Filesize

    2KB

    MD5

    43df87d5c0a3c601607609202103773a

    SHA1

    8273930ea19d679255e8f82a8c136f7d70b4aef2

    SHA256

    88a577b7767cbe34315ff67366be5530949df573931dd9c762c2c2e0434c5b8a

    SHA512

    2162ab9334deebd5579ae218e2a454dd7a3eef165ecdacc7c671e5aae51876f449de4ac290563ecc046657167671d4a9973c50d51f7faefc93499b8515992137

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\AC6JR31I\f[5].txt

    Filesize

    28KB

    MD5

    d8c8d00ce37f3b5a69905b15244d5d4a

    SHA1

    45a643ea54bf6591b1bf14b5f3723b098f15e803

    SHA256

    3694bc5a1eac1e9d958aeb602388bd2d9372876d4b033318646c95d439e6df25

    SHA512

    48a20aa7ad8d2c9f7bb481ce9152ffd80beba1351082dccd56f0ff7aae1982861fe3ea156e9620c2376802f247fff98e86286f04a0de60268bdd821a62852140

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\Cache\K80P1MBJ\rx_lidar[1].js

    Filesize

    158KB

    MD5

    b95d321a1c0748ca21fcd82d9a3c62b7

    SHA1

    5a1ac24c3b6adf6ae010a6fca3797bce3239baaf

    SHA256

    211b508f51e67897ed88fa49901e1ccbe5e1ddacdc43a391f699f757ce1c0a9c

    SHA512

    2d01174e297de0657aed149b97ec8eaf77e4692a3f2568a3bf2fc27f5d64e43733177da8225293e1431ce31f4456255256179cb7dae70564b2b9c5ee2b85f2da

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\3U1TL99K\robloxscripts[1].xml

    Filesize

    100B

    MD5

    b2cfc83a5815996a1d62c3cbc72189b3

    SHA1

    3275e06137d14fc873106e7e16e3eff17bdab546

    SHA256

    0c21474910234134aa3a8c0d83bc7afa38095a75dafce31ed0bd248d6e9bde5d

    SHA512

    de07fbe024b9520484243cab29be5ec123213c2f06acdaf69aab390c0f6245ac0fbe7763122738543cec6bf1cfceeeb2ee289bb8e4e6160219bf188c02df0528

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\3U1TL99K\robloxscripts[1].xml

    Filesize

    2KB

    MD5

    a03dc3eab5808e9aeb4a1b8e94b54bfc

    SHA1

    3863975efdff0d9a593bc805b413d7aaf073b140

    SHA256

    5813aa171b233b231d575133c4da4a92d3f5f7837bc08f9af88c698bef82395c

    SHA512

    47c81693abda4f7af4b940927e61de29f41506a8641d0d597d55b4461ca31f69a3622343a86da30a81dbfe75f8bf6933c46ac27b829e071eb6758be33968d9f8

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!001\MicrosoftEdge\User\Default\DOMStore\C5ZZMUWM\www.google[1].xml

    Filesize

    13B

    MD5

    c1ddea3ef6bbef3e7060a1a9ad89e4c5

    SHA1

    35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

    SHA256

    b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

    SHA512

    6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\1N53VGS2\cropped-RS-Logo[1].png

    Filesize

    805B

    MD5

    8713f2ae17215f24d6987cb8c58c34cc

    SHA1

    e05f089f6b4bfc6f3ec73f2058939d9100398180

    SHA256

    17323946da1c58727c6d39b8c2f5143ecae54fdd59b8225c57053a30e48dc313

    SHA512

    efccb2beee717a2678360258da9a536c9d5c18786bc4627003cb7b54e86d01c08c9a668471e336ded0db7b411425df78079c08e2ba47caa3a716c7cad418cb96

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\INCANGMK\suggestions[1].en-US

    Filesize

    17KB

    MD5

    5a34cb996293fde2cb7a4ac89587393a

    SHA1

    3c96c993500690d1a77873cd62bc639b3a10653f

    SHA256

    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

    SHA512

    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\Microsoft\Windows\3720402701\2219095117.pri

    Filesize

    207KB

    MD5

    e2b88765ee31470114e866d939a8f2c6

    SHA1

    e0a53b8511186ff308a0507b6304fb16cabd4e1f

    SHA256

    523e419d2fa2e780239812d36caa37e92f8c3e6a5cd9f18f0d807c593effa45e

    SHA512

    462e8e6b4e63fc6781b6a9935b332a1dc77bfb88e1de49134f86fd46bd1598d2e842902dd9415a328e325bd7cdee766bd9473f2695acdfa769ffe7ba9ae1953d

  • memory/704-478-0x000001FB514F0000-0x000001FB514F2000-memory.dmp

    Filesize

    8KB

  • memory/704-539-0x000001FB510A0000-0x000001FB510A2000-memory.dmp

    Filesize

    8KB

  • memory/704-301-0x000001FB52120000-0x000001FB52140000-memory.dmp

    Filesize

    128KB

  • memory/704-348-0x000001FB51C00000-0x000001FB51D00000-memory.dmp

    Filesize

    1024KB

  • memory/704-364-0x000001FB51C00000-0x000001FB51D00000-memory.dmp

    Filesize

    1024KB

  • memory/704-241-0x000001FB50F00000-0x000001FB51000000-memory.dmp

    Filesize

    1024KB

  • memory/704-408-0x000001FB52980000-0x000001FB529A0000-memory.dmp

    Filesize

    128KB

  • memory/704-445-0x000001FB51260000-0x000001FB51262000-memory.dmp

    Filesize

    8KB

  • memory/704-443-0x000001FB51240000-0x000001FB51242000-memory.dmp

    Filesize

    8KB

  • memory/704-441-0x000001FB51220000-0x000001FB51222000-memory.dmp

    Filesize

    8KB

  • memory/704-475-0x000001FB51270000-0x000001FB51272000-memory.dmp

    Filesize

    8KB

  • memory/704-183-0x000001FB4D600000-0x000001FB4D602000-memory.dmp

    Filesize

    8KB

  • memory/704-492-0x000001FB53940000-0x000001FB53A40000-memory.dmp

    Filesize

    1024KB

  • memory/704-510-0x000001FB51320000-0x000001FB51322000-memory.dmp

    Filesize

    8KB

  • memory/704-188-0x000001FB4D6F0000-0x000001FB4D6F2000-memory.dmp

    Filesize

    8KB

  • memory/704-531-0x000001FB51020000-0x000001FB51022000-memory.dmp

    Filesize

    8KB

  • memory/704-535-0x000001FB53940000-0x000001FB53A40000-memory.dmp

    Filesize

    1024KB

  • memory/704-255-0x000001FB50F00000-0x000001FB51000000-memory.dmp

    Filesize

    1024KB

  • memory/704-545-0x000001FB510B0000-0x000001FB510B2000-memory.dmp

    Filesize

    8KB

  • memory/704-662-0x000001FB4D610000-0x000001FB4D620000-memory.dmp

    Filesize

    64KB

  • memory/704-661-0x000001FB4D610000-0x000001FB4D620000-memory.dmp

    Filesize

    64KB

  • memory/704-186-0x000001FB4D630000-0x000001FB4D632000-memory.dmp

    Filesize

    8KB

  • memory/704-660-0x000001FB4D610000-0x000001FB4D620000-memory.dmp

    Filesize

    64KB

  • memory/4500-571-0x000001DA57FE0000-0x000001DA57FE1000-memory.dmp

    Filesize

    4KB

  • memory/4500-573-0x000001DA57FF0000-0x000001DA57FF1000-memory.dmp

    Filesize

    4KB

  • memory/4500-165-0x000001DA56590000-0x000001DA56592000-memory.dmp

    Filesize

    8KB

  • memory/4500-164-0x000001DA56540000-0x000001DA56542000-memory.dmp

    Filesize

    8KB

  • memory/4500-162-0x000001DA51E90000-0x000001DA51E92000-memory.dmp

    Filesize

    8KB

  • memory/4500-160-0x000001DA50BE0000-0x000001DA50BE1000-memory.dmp

    Filesize

    4KB

  • memory/4500-141-0x000001DA52300000-0x000001DA52310000-memory.dmp

    Filesize

    64KB

  • memory/4500-123-0x000001DA51A20000-0x000001DA51A30000-memory.dmp

    Filesize

    64KB

  • memory/4600-119-0x00000000001E0000-0x00000000002D4000-memory.dmp

    Filesize

    976KB

  • memory/4600-122-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4600-121-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4600-120-0x0000000004E50000-0x0000000004F00000-memory.dmp

    Filesize

    704KB