Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 12:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1263821966637535253/1263831457357631558/ULTRAKILL.exe?ex=669baa44&is=669a58c4&hm=cec5fff891e542f57f5c51a76154cc4c62dcee9dc793d7f44b9d7e376ae47e66&
Resource
win10v2004-20240709-en
General
-
Target
https://cdn.discordapp.com/attachments/1263821966637535253/1263831457357631558/ULTRAKILL.exe?ex=669baa44&is=669a58c4&hm=cec5fff891e542f57f5c51a76154cc4c62dcee9dc793d7f44b9d7e376ae47e66&
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 5164 ULTRAKILL.exe 5268 ULTRAKILL.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 271410.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 3348 msedge.exe 3348 msedge.exe 5040 identity_helper.exe 5040 identity_helper.exe 4512 msedge.exe 4512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe 3348 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3348 wrote to memory of 2784 3348 msedge.exe 84 PID 3348 wrote to memory of 2784 3348 msedge.exe 84 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4240 3348 msedge.exe 85 PID 3348 wrote to memory of 4480 3348 msedge.exe 86 PID 3348 wrote to memory of 4480 3348 msedge.exe 86 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87 PID 3348 wrote to memory of 2208 3348 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1263821966637535253/1263831457357631558/ULTRAKILL.exe?ex=669baa44&is=669a58c4&hm=cec5fff891e542f57f5c51a76154cc4c62dcee9dc793d7f44b9d7e376ae47e66&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc1bd346f8,0x7ffc1bd34708,0x7ffc1bd347182⤵PID:2784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2372 /prefetch:82⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2060,17571898767886982077,10530467264573243687,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4512
-
-
C:\Users\Admin\Downloads\ULTRAKILL.exe"C:\Users\Admin\Downloads\ULTRAKILL.exe"2⤵
- Executes dropped EXE
PID:5164
-
-
C:\Users\Admin\Downloads\ULTRAKILL.exe"C:\Users\Admin\Downloads\ULTRAKILL.exe"2⤵
- Executes dropped EXE
PID:5268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD5072052cd881351bfeaf2fe4a6a0063e2
SHA184e6c6ea0aaa788957404f0a35f41b4d9886e977
SHA256a65fa3eb6e155a5ed1bf2c0a4276900d9fa5c061b450d10856ebddc91da92959
SHA5123246cf66b8005c4f93e14e094ff87faf81bdbb307d1bebc8a44e25b5709284fc8ea4156f4fc0c448f6bca8d59cc0a1ef0f136d0f7ffe793ddf4a2028f44359cd
-
Filesize
5KB
MD544ba1d4c8906252971cd392a4ce1ebd0
SHA1b5a441a2da5b896de1ebdd702aed66c8401adc2e
SHA25643002cc4683e2f853f7a0e4bc007e46bcae155d3d9e847f7f17f95bc712e2759
SHA512dd46d9fd421e1c97970b3cf137c31a4a9a3f390810d8126062adc58aca52fd1b2c6c9912e981861eae624cfa9beec81d0d8ceb3f79b33066421ac8c159fe2d52
-
Filesize
6KB
MD5b630f1db2f9b30db2a13c7f1a2c202ee
SHA19a437dd088d79b3ac7399d57f00b7813c67a3d99
SHA256509683bcc48da0856661a44757f64be1bdb17664bda5fcbe9702066b0a952284
SHA512b3f676bc880c4f2cef670cab3a959a2093e7c7171511692ae3bc89d8bb61793cfafffdd4e69a1c12ec62bfc56f57f6d3643edf1f5189068f6d467a08c8f1d3d2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a9a0e78ec7208fbb51c74d9ba6de5cbc
SHA1216749683d1cbe4de325b4039b7f1163c32021f0
SHA2560a35a068d04e8a84cbc6d82ee46464c335b02d0bd466631530d41ca750951ebe
SHA5126f9c008da027360d354c3ee31d1e9e01e1fcf4a91da3cc2dcf7d674996b1bc226624f6ef99dfe1a638dca098e98ce12d932165d2c404fdfbc5f3c386408bc2e6
-
Filesize
11KB
MD50af06ea2e23dbf9bf5fe4c3dd92f96ea
SHA11847b607cddf9e98a5f7f127e8b02a15977c885b
SHA2569f2ed5098244d6c2a52de8a0c22b256e68958334172167be62eb554a1eea54b3
SHA512d060f3002230d43472ce182548e1e34fb62445e5704a2790922849a83fba918cb29a0c098c97b94e639c1fc4a15cef82029392cbb275baac2c4b883342cda6de
-
Filesize
635KB
MD5630f833b114430869c4682ea07e4ac86
SHA1e8ce9fb4fe10eabd953696e8f1a38718742699c8
SHA25649230b2c1f1c470b157923481daaca15b2a64ef8275e3a731e0cd89769a8d5db
SHA512a7ac3d675cc9944d325fe419de754a4359671c4a23fc8c5dae61d4dd816b29c8fe9bb23d6def300c844f8eaeea961871a957659683989b519b4f746f65a6d386