Analysis

  • max time kernel
    73s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    01/09/2023, 02:38

General

  • Target

    ULTRAKILL.v24.12.2020-PiviGames.blog/ULTRAKILL/MonoBleedingEdge/etc/mono/4.5/settings.xml

  • Size

    2KB

  • MD5

    ba17ade8a8e3ee221377534c8136f617

  • SHA1

    8e17e2aec423a8e6fb43e8cbe6215040217bb8a3

  • SHA256

    ce1db1ad8a9512073164e3eccdc193f7eda036e1a9733caec4635de21b2865c8

  • SHA512

    c18bcbcbd4b9a20a72b1a934d70db1eafef047f34f3ba2c6357d8e3afed07ecaab861e5571ceb58c22d4d3e5ebb34b51e366a0553c3153fbc263d1d80472e297

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\ULTRAKILL.v24.12.2020-PiviGames.blog\ULTRAKILL\MonoBleedingEdge\etc\mono\4.5\settings.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2708
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2744
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2744 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2552

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    823910b948eec1eb5f0b34f23248283a

    SHA1

    c106d7d76e7534ff97cecff128ae107222ebd7df

    SHA256

    412e461edb271999fd82288fe2e8a0bfcd507735b3308c944af83a276930d40f

    SHA512

    3d24c2413826921934310afb0ce489b1eaa5c51501821adb15c6c315d1dfc446cf048b88568f138cb38a2e13a686d9961c08876a035b04d37299530ed812f91b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    16c2ae5f4f3556af2f2edc1a6c9faea4

    SHA1

    b7449a3f35319dd556898fecdc97581d9bf79e77

    SHA256

    73b09ba354077a46fb09c9f4ace101186d66e5426e118ecc5d74a94a5df02504

    SHA512

    c3d22c76af98fb68d4b5c46ff75657bcc45872d03e721a19229df3c74783796fb0bdde305509335d879951a8956243546f126f3ffb4bf722638052ae61360c11

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    17c44851097a71dab7441c2124a12e76

    SHA1

    683d02b4344deb02b501b798d12d3be9459a0b84

    SHA256

    63ec118ef0a2cb677b4ffab294b41c668d6314112b4685ec20993c64ca5114e4

    SHA512

    5c2d99cda847052c3a9ff5316ec8f1144e6a437a450599d690c02778a38422f3dd8ab3301de9c2ca8e478cea8415d2974571d15cedd6721ea28aaa4909a398d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    817777d561e7fb4858ffe79bbdc6e55e

    SHA1

    4e815dcce2a6f2d714ab7aba1f0972e65e1a8572

    SHA256

    a57b8cf2dec4cf3968d198d3df8250666d1459e62d9625ed06894514b9e05c34

    SHA512

    6408054427a49770dce22babed18dbf0b1ea5e2585c33db7b1efb6c79a106abd81e2070c48efdbcf1a14f38dabf2277fb378a9f68164f8e3aec926fafadb52fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2ff32d15383a769e4d89674d61e9647e

    SHA1

    a220eadb64d65aaaf62bacebf817ca9056c4b18b

    SHA256

    eb24c54be6d6afb56e82fe920ff5e1f53b9c4082339cb21eca25eb837d68bccb

    SHA512

    3675228db12f2893ab955c384eb2ab3c9e904b5387298006d7deb0465929452d7cb3f03be5da4364b66fdef9c7f7cdd1e137826e156caecb082d543c1ec381b4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2f1162f04f82f20f509a0fe7e53ebc06

    SHA1

    b7571b9c5f6ff105341ebe1f91cc0288b3eedc01

    SHA256

    3cf771a5aceeea328e73320f7823e35338e39775ac3673f3ce04e7adf204581a

    SHA512

    a1898db84b78bb22de8dfcbb92a4de9e3bedf05f284cb15ea8cf8599ff726f0246ebf0330e3fc92cbd58b14b118565d868392a0a0df60a7c15eea9db36cd4ea8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    4fcf58b9f74b87570dfeffa3d8e90c88

    SHA1

    0a74e2a774b9f1d56e936337be89e532dd827ab1

    SHA256

    4d58cbc5e79532617bc84139e81e650e656f1cd5b4c64820fe896ab0a9fd8af8

    SHA512

    aeed4ca9401c21cf6d32d320a44ac675aa96b4f4de32e6adceeddc8d1ec4932e9d4967f5c82a4c3100f333e2e1778e67830e64b699ae6cc6b681fc365ea9f7f5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9573e3a80ac05017c1c1377b4851f004

    SHA1

    d61fd1bddd3c99032257f1f727961d05797d5b5d

    SHA256

    9674de32561dd9f963160edbac11ab15fee5dbb5c156b0124dfa2c777a4a4d88

    SHA512

    021a8be7fc19adc7ce6f956a9142eec01b116bda77ceacb98a9b02ba8f981572f61a6dda48a18aa3e2fabcde1b9dff4886166e36f4c88aade7654616a6cfb8e1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    bd07b6e50dd2e6b4921450be1173d804

    SHA1

    3a450572d9d57882841b503316b46e672789631e

    SHA256

    033ea1b17ed1ace287eeaf4f75a5503c987d3b459fdcc1c9754ec83cde1f616d

    SHA512

    872f2efddef30f03eaf56bd308a183423e2ba0761edf3fd44bd36c7c447d242eb0b99ed8899f54cebd8a95bbf6a80b2baa6b2224b2339c3cf61b8817c68946b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    147840155bd37480de50a78bb1be6bd6

    SHA1

    2e34112cd926e45e0cac74c95789ab2ec7983523

    SHA256

    0394ad09d88275ead303e3e07cbe8e736728baf6bfbad59ecc0da4d3f7f8f774

    SHA512

    35a1ec60b0b30a124cd20f9437f76fdf547f7cfa6396b8d6b04de3f93541f67b5b33097b873d51c098a2051bf54d50c58702019054135ee6381cb3d3bc1ba885

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ee16d73d3e48de886e0f9826570cfb96

    SHA1

    ba215a8458fe87d292356929302471d0e5975458

    SHA256

    1d3588b7e13c08eb8bb546160ea5e35d9dc880468d154a5a713fe0ac5a0b67b0

    SHA512

    9480315ef18f6fe6d4ee6c77c5d1ad43df0c35e160e36e59f7bb6fa035d05ff5f131ade4c23bb401371f3f2b0fbffd505eefe4dfcdaedb7abf5caed7f8f307d9

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3e563f7f1d27f336d65fae5ee97e50a8

    SHA1

    54c7d5077ef5159cac5af79bb72554723943b350

    SHA256

    b73885dfdd194b3308015bad084a382a2c5f3c6a1f7fd1c09d87fb0279cfd85a

    SHA512

    8520ce70629e4543ea7a2073e40901ce16fe99bbd6dd5d98a569752bd604e432480575127dc2ab2313d9391ecc06b52f28a7b5cdb6afa18502b02d4c11b4bb6b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    b577fc5d057d3c70e7846a0018bceb4f

    SHA1

    7eb3c471aec3dca5207b7f40d5f99bacbe132248

    SHA256

    55757a46d2843ba048458c35d98e1dedbfc2f50af2fce5b90a2dc0d72a1e9b20

    SHA512

    51311d3919ab8c59cff8b8446eca99ff0c61e11cd6596961fe732e67e12af507a8743fb07aa6c0a4aa27a3718be927f7501d0c597af252bbd0fe6f8dc67319be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    14c74ffdc89c3f75142cf3db12a7f6ba

    SHA1

    93eab80a4152f238c312cd4081b0f72880e6a354

    SHA256

    f21a21fcb75dd96ebb68031bb9410f1be36e63f77b37bfaa86ae55fc8ce8c88f

    SHA512

    9150d4ddb4b7311c0cdc8c7c74c3428b5003abbe1816d178c7a48c4fa0c7072106afb497aa0efe96d6fcb0c000bc8bcb7d0a21d9bf5b2b2b6ce80e7c1f4f0f46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7ecaa1114a7e8f44b049c353006a7059

    SHA1

    fc4e97288f9f212537366c80ce099653d3c891f5

    SHA256

    75d19fd2ac0b75a08a3d59d43fdcb115f9f3287cd5366cded993cb120318ee6c

    SHA512

    a33799ca42778026d5c01f5b556f38022b2350bbb3214385007c87a82160a3d051a1f0f74e3575e73614ccdf4d9a6c36cb808aa64e7b4c9f5b632484e1e6e002

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e25e27838fc60b6366f92ccdebe309f6

    SHA1

    ee341654c0100ec277eb16efb0b62e70ab552d95

    SHA256

    1e084505c784cf3a59b57e2ddd697a27d82caadd2954194b3903540d3d88d5d4

    SHA512

    6fc39bfbe1ad7f88da20785f1b7cf7ae00f8bddd28feeb1518968ccbb1e9e78f4e109ff6c16d0d69a20f183402ca35220fcca335d95483f9b0c761bd47af04f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    36f6b15c403b1f14424434175d66237d

    SHA1

    522578cbd9f0b111330bcae78f46b09b68a29618

    SHA256

    9d87795397aba59934694799141e8e481c395c15c5af5e6fc335feaef8cc02e1

    SHA512

    66d1bbf8c234e1cf8f9f25fcb3f91827451bcba366109df6eac2ec3c5b37e6633a6b2f11ef408226ce0fc340c2cef994fa93895827e34aac3222e1693c4748b1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    94b73faf2594ccb8966355f7006eecbe

    SHA1

    30c482376999828a1063f2ea09d51c5ba73be473

    SHA256

    c6a045078c9bee7388960462a0a1061bf01ed0a4ae1c270e7a05a896a61bcdbd

    SHA512

    fca93aa05a636562e9f14952f7f047e55438c5f4116f5d3ed1e3a4d13ae47f363dc0fddfb1ef1a6a221e0fed0bba9551435e758d6b146950e385083d7807287a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3aedce2b5bee61fec9e788664594393

    SHA1

    bb29a4a5ce74179848e0946d6aeae76ec89322fb

    SHA256

    bf0a24f450dbc6a3ab55e0d7c580b4d0abc78a8b6d9c50c294961fbd2040ecff

    SHA512

    ac1c57a0ce7f31adf2e4527f0af9da0154aff76a1ca93e67fe84754773b03063103be0cc839838f0c4f400937dcd1d7cc6548dbaeff8a0254c4c3e63031e2360

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    707857924fc8bdc11b0763f2e790ec51

    SHA1

    97f2cc0570aa5759377e111887c9993772b27d3b

    SHA256

    db90ec8905b18422a45692a3ac94cf04416d1c4a402b8cfc4465834067157e74

    SHA512

    100cc72f65f122b5edd608f75092110cc93934065f9c16feb2dc94a7b3001e964eec2a57443aa90a5e13d9431efd72707ca51f200e36dd3e9d196982a84034c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c8908db1e208572cb25695c9cb129b7a

    SHA1

    cab4743afd8f20fb7709862fc5f1418bc1692f0b

    SHA256

    ec7e919f59e59e2faaff2380bc8412233928e3695563f2689c982adfaac0e6e1

    SHA512

    cc6360b704fee9f9177b27de29bf336251043c05ca5310c4d64524b54dfd366dda75de1777570adf23345fb54e628bef54e21a2cbdbffec18cff3f8c82ac41c9

  • C:\Users\Admin\AppData\Local\Temp\Cab4DE5.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar4EB4.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf