Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
01-02-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
UltraFuck.zip
Resource
win10-20231215-en
Behavioral task
behavioral2
Sample
UltraFuck.luac
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
resource/fonts/fa-solid-900.ttf
Resource
win10-20231215-en
Behavioral task
behavioral4
Sample
resource/fonts/fontawesome-webfont.ttf
Resource
win10-20231215-en
General
-
Target
resource/fonts/fontawesome-webfont.ttf
-
Size
161KB
-
MD5
b06871f281fee6b241d60582ae9369b9
-
SHA1
13b1eab65a983c7a73bc7997c479d66943f7c6cb
-
SHA256
aa58f33f239a0fb02f5c7a6c45c043d7a9ac9a093335806694ecd6d4edc0d6a8
-
SHA512
9ffb91e68c975172848b4bba25284678cc2c6eb4fb2d42000aa871c36656c4cebc28bf83c94df9afdfbf2407c01fe6b554c660b9b5c11af27c35acadfe6136ac
-
SSDEEP
3072:3bhEnD+IzsU9z9QJ6/P3Xe2iEiEPGFCMW1JVJG6wVTDsk6BmG6S1yKshojskO+b2:3enD+IzsU9z9QJ6/PO2FiEP2C/DVJG6I
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1968775928-2924269989-3510977013-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 168 wrote to memory of 3192 168 cmd.exe 72 PID 168 wrote to memory of 3192 168 cmd.exe 72
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\resource\fonts\fontawesome-webfont.ttf1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:168 -
C:\Windows\System32\fontview.exe"C:\Windows\System32\fontview.exe" C:\Users\Admin\AppData\Local\Temp\resource\fonts\fontawesome-webfont.ttf2⤵PID:3192
-