Resubmissions

19/02/2024, 21:29

240219-1caa6sde7w 8

19/02/2024, 21:16

240219-z4js9add3s 4

19/02/2024, 21:15

240219-z4awcadc91 3

19/02/2024, 21:12

240219-z2gk4sdh23 4

19/02/2024, 21:09

240219-zzmdksdc4v 6

19/02/2024, 21:06

240219-zxt1msdg44 3

19/02/2024, 21:03

240219-zv6xesdf98 8

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 21:12

General

  • Target

    ULTRAKILL.exe

  • Size

    635KB

  • MD5

    630f833b114430869c4682ea07e4ac86

  • SHA1

    e8ce9fb4fe10eabd953696e8f1a38718742699c8

  • SHA256

    49230b2c1f1c470b157923481daaca15b2a64ef8275e3a731e0cd89769a8d5db

  • SHA512

    a7ac3d675cc9944d325fe419de754a4359671c4a23fc8c5dae61d4dd816b29c8fe9bb23d6def300c844f8eaeea961871a957659683989b519b4f746f65a6d386

  • SSDEEP

    6144:K/7oYfSHQPWTUg482BEevumoLTh+6+2Bqty:I7qTUs2BEevumoB+6+Nty

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ULTRAKILL.exe
    "C:\Users\Admin\AppData\Local\Temp\ULTRAKILL.exe"
    1⤵
      PID:1200
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa398d055 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:2212

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads