Resubmissions
08/07/2023, 05:53
230708-gla5aach75 308/07/2023, 05:48
230708-ghvdrach74 308/07/2023, 05:35
230708-gab77sch66 808/07/2023, 05:22
230708-f2qdgach59 8Analysis
-
max time kernel
102s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
08/07/2023, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
UltimMC/UltimMC.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
UltimMC/UltimMC.exe
Resource
win10v2004-20230703-en
General
-
Target
UltimMC/UltimMC.exe
-
Size
8.8MB
-
MD5
dec33b921534bfefd0f06aee6af7291b
-
SHA1
0b6cfa43c79071272a865471f2927f62f6cc3d30
-
SHA256
499422dc9e9e33c685b93fb9bf5c90e03d7aa75af31fd1c05f152259a7bd8774
-
SHA512
b377aef7dfbab0aff7e706ada839dc4fb95a70024e98455c20a810de6bc872fc4a72c138b650e3f5ebc3dce23cc18ca771206f9e1af15f5882786c0c32af3bdc
-
SSDEEP
196608:1vEsCQdpPhdnaJjgDLEjixC9IDe4OHlnwd+PXHdiVzVsVKV4113VTVVxAVUVgVC2:QAO5gDhVA/YVsVKV4113VTVVxAVUVgV9
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 468 UltimMC.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 468 UltimMC.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 468 UltimMC.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2612 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2612 AUDIODG.EXE Token: 33 2612 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2612 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 468 UltimMC.exe 468 UltimMC.exe 468 UltimMC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 468 wrote to memory of 2196 468 UltimMC.exe 29 PID 468 wrote to memory of 2196 468 UltimMC.exe 29 PID 468 wrote to memory of 2196 468 UltimMC.exe 29 PID 468 wrote to memory of 2196 468 UltimMC.exe 29 PID 468 wrote to memory of 2432 468 UltimMC.exe 30 PID 468 wrote to memory of 2432 468 UltimMC.exe 30 PID 468 wrote to memory of 2432 468 UltimMC.exe 30 PID 468 wrote to memory of 2432 468 UltimMC.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\UltimMC\UltimMC.exe"C:\Users\Admin\AppData\Local\Temp\UltimMC\UltimMC.exe"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files\Java\jre7\bin\javaw.exe"C:\Program Files\Java\jre7\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/UltimMC/jars/JavaCheck.jar2⤵PID:2196
-
-
C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe"C:\Program Files\Java\jdk1.7.0_80\bin\javaw.exe" -jar C:/Users/Admin/AppData/Local/Temp/UltimMC/jars/JavaCheck.jar2⤵PID:2432
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2612
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
953B
MD59ac77540a214e670e373cccc7500a1cb
SHA155df21fc2d3c4a7c70e6548d67405390768a8e50
SHA256a63e0ba821c598884d1513aee303600f1009fe268ce497f3b44e2914697ea85f
SHA51211ddfb27fd61c504f7f450d759b0f0b72dd4046c5b6efe61fa88fe625dd36ef5396706e760462efcced2bc96bf8cbebead340fd2732620ec6d97f353314893b6
-
Filesize
15KB
MD564eb5323c137fde7680ed29a17c53d65
SHA103cb5da4bed79def57b15974129e9589d2f26763
SHA2560ff7e6ca2aa7baff4b965125cda67310a80f061b4b6bfe3321960f8b24c7ab57
SHA512b56056a586055957d7f4506328095e5e567dff8df6fe2142f365cebe14562fbf70c19642a3627e8d96e848142efe2990e85be8eb7eb2f7e0ad89b3176311650f
-
Filesize
1KB
MD511af57a08fa469ca8d168642a874721e
SHA188a62ef6dc36ef53931748a4c8738f1ab97e0a04
SHA25671df1ff9ccf8d0d26ebe9d8c90498c8d8d8a4ed97d9142d7579df8bd11cc307d
SHA512eefecd0b8dd84b0fad873ff5afa0e6bf80e649731a4d142b8750e3140f4250b226c21c4bcc4b75ad58c94925a3a9fbe37153d586312bd1c14f5ef687204767eb
-
Filesize
1KB
MD5222d16d2b1f36ea81f88cc71a992ddd5
SHA12d6c54615a0836a47ff192c0bf6dab4a84a7a5a6
SHA256515a40dad81cd87b516fd33961d3e348e07057b69d1700f44886d8cde64aeb5e
SHA5124eef97c6cc8894e8a8b2193d42a6c2f7b7c4fe9cd36b53b647744b602f472c485742d3f4fa158cf16ce5024b368fd05cddf05fd35fd05fa6e6e0cdb9c80efab9