Resubmissions
03-01-2022 15:51
220103-tagh5sbdh2 10Analysis
-
max time kernel
301s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
kr.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
kr.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
kr.exe
Resource
win10v2004-20240226-en
General
-
Target
kr.exe
-
Size
786KB
-
MD5
899dc9cc6e7516536bf5e816e8cecf55
-
SHA1
6c07fc00ed2202798194749aa8037bb0ad38bb00
-
SHA256
5f84ad4413ad6dcdea0cb3aa206cc4df29e1bad9d9598912c323c931d568ac90
-
SHA512
445016f0e37ee3ecec319b73713d083711608c044f855e16268f89c88d460e95d85b79d375534ac6b7a4a0e869c49470d49b7e325ff0507c550107d593ae688c
-
SSDEEP
12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+JigR:vyxPJ/s86szWEuKiflOmMDhPEhL+lR
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ultrasearch.lnk kr.exe -
Executes dropped EXE 1 IoCs
pid Process 2820 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 api.ipify.org 49 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe 2920 kr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 kr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2820 2920 kr.exe 99 PID 2920 wrote to memory of 2820 2920 kr.exe 99 PID 2920 wrote to memory of 2132 2920 kr.exe 78 PID 2920 wrote to memory of 2352 2920 kr.exe 79 PID 2920 wrote to memory of 4028 2920 kr.exe 80 PID 2920 wrote to memory of 1828 2920 kr.exe 81 PID 2920 wrote to memory of 4160 2920 kr.exe 82 PID 2920 wrote to memory of 452 2920 kr.exe 84 PID 2920 wrote to memory of 3336 2920 kr.exe 85 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100 PID 2132 wrote to memory of 440 2132 msedge.exe 100
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x238,0x23c,0x240,0x234,0x2b4,0x7ffdb24e2e98,0x7ffdb24e2ea4,0x7ffdb24e2eb02⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2268 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3228 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:32⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3336 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5396 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5524 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:82⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=3228 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:32⤵PID:1804
-
-
C:\Users\Admin\AppData\Local\Temp\kr.exe"C:\Users\Admin\AppData\Local\Temp\kr.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:2820
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
36KB
MD5066ecc3199dad962954e28dc0bdb25a0
SHA1ac7c23c176074f310f3122967205c6e09dde587b
SHA2567b13feb2456aa6cec6713a6150796f20c79e639fb1978e1f20cdfa31c9a23f86
SHA512eab108696151a979be08835110ba7952eaa5c7476d60fed336b7968a8ab968425c0378a14f5e8024be2d32a47eb57f7a3b53980c8c534a4720ee64a0e15939d1
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD5adee1e3b7f1a6249eac7e8c9d800e19d
SHA1a56d555e1acef10d6c819c458bce9e727f28ae9a
SHA256f8bc892dc77e4f66fa32cbec38d35a1aca3824ebeb863964e65b94952f1ef3f4
SHA512eb517996d08753bbbc0f240876ba7eb42f3a1f55e66a3b2df6a3ecfb8132052a134c2078e843f500ba123ebe215abf2888d28d6fefe12371fef157a3eeab1913