Resubmissions
13-09-2021 06:40
210913-he9jyadaf7 10Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-04-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe
Resource
win10v2004-20240226-en
General
-
Target
ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe
-
Size
786KB
-
MD5
a30305745d72e2361e1799914bd56526
-
SHA1
89234b71a3e24511c221023c21df7a49134ee70c
-
SHA256
ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a
-
SHA512
be665052f70510ac875884e228dcea37bbf8dc3c86560c178d847651bb8e41a2e574adfa57187323f748715f7759cede80cdc1cc0ffe129814c30afef0d52c58
-
SSDEEP
12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+JigW:vyxPJ/s86szWEuKiflOmMDhPEhL+lW
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ultrasearch.lnk ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe -
Executes dropped EXE 1 IoCs
pid Process 404 GetX64BTIT.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 52 api.ipify.org 53 api.ipify.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4664 wrote to memory of 404 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 99 PID 4664 wrote to memory of 404 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 99 PID 4664 wrote to memory of 3008 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 77 PID 4664 wrote to memory of 4916 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 78 PID 4664 wrote to memory of 3580 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 79 PID 4664 wrote to memory of 2724 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 80 PID 4664 wrote to memory of 3452 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 81 PID 4664 wrote to memory of 3032 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 83 PID 4664 wrote to memory of 3920 4664 ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe 84 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100 PID 3008 wrote to memory of 4292 3008 msedge.exe 100
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=122.0.6261.70 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=122.0.2365.52 --initial-client-data=0x23c,0x240,0x244,0x238,0x260,0x7ffc9b282e98,0x7ffc9b282ea4,0x7ffc9b282eb02⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=2652 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:22⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=2756 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:32⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=2860 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:82⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --mojo-platform-channel-handle=5424 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --mojo-platform-channel-handle=5580 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3952 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:82⤵PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe"C:\Users\Admin\AppData\Local\Temp\ac6c81185df544af2f0c7563451d654cfa879a0d4bd4cfefff49f157a976a27a.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"C:\Users\Admin\AppData\Local\Temp\GetX64BTIT.exe"2⤵
- Executes dropped EXE
PID:404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b4cd27f2b37665f51eb9fe685ec1d373
SHA17f08febf0fdb7fc9f8bf35a10fb11e7de431abe0
SHA25691f1023142b7babf6ff75dad984c2a35bde61dc9e61f45483f4b65008576d581
SHA512e025f65224d78f5fd0abebe281ac0d44a385b2641e367cf39eed6aefada20a112ac47f94d7febc4424f1db6a6947bac16ff83ef93a8d745b3cddfdbe64c49a1e
-
Filesize
28B
MD57b1d4683b4a9eafd7fa2ae0e04f3376a
SHA1d68defdb16f0474cec70b1b328878fb8f8ba3de9
SHA256b22abf60c37efc397db5278fa241ba6e8b8dc4d29ac213daa96d45def0bf70c1
SHA51296a2f858b3cb99c6eff160779a312d5c5d74234459ea9ebc0d3fcba31c4aba0a5ac2f14d9299270c3eb0d9bb77432c908c3502adbc97cd1c317f6a2f7e44d1a0