Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
HA_UltraAudioRipper-v2.0.2008.401/HA_UltraAudioRipper-2_CZ.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
HA_UltraAudioRipper-v2.0.2008.401/HA_UltraAudioRipper-2_CZ.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
HA_UltraAudioRipper-v2.0.2008.401/新云软件.url
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
HA_UltraAudioRipper-v2.0.2008.401/新云软件.url
Resource
win10v2004-20240802-en
General
-
Target
HA_UltraAudioRipper-v2.0.2008.401/HA_UltraAudioRipper-2_CZ.exe
-
Size
5.4MB
-
MD5
2399386046aa791dea77153ecd81bf46
-
SHA1
bbcd13d1cf9608358b09b67031b8b2faf6a10330
-
SHA256
b2be2b6d673b8eef56a06da3009b327bee612380a8c27daeed61b071114c4733
-
SHA512
bc2bf259096760f8f9f80a8aa9aa39fe84f1f435eb8e892667198442f1c9b20283394d5985ed48d2135a9bef97390683a0f024adadb20f611a340c49058369d3
-
SSDEEP
98304:nndX4cyda/Pj22gtbKxzVWROhi9QGSCoJxQA5cO2yI1pWwBk8b3GllC2gtSO0/tl:n2sgtbyxmUi9PEJCAiOY1l68jGlX8SOm
Malware Config
Signatures
-
Loads dropped DLL 9 IoCs
pid Process 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\bassmod.dll HA_UltraAudioRipper-2_CZ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HA_UltraAudioRipper-2_CZ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1864 HA_UltraAudioRipper-2_CZ.exe 1864 HA_UltraAudioRipper-2_CZ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3352 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3352 AUDIODG.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\HA_UltraAudioRipper-v2.0.2008.401\HA_UltraAudioRipper-2_CZ.exe"C:\Users\Admin\AppData\Local\Temp\HA_UltraAudioRipper-v2.0.2008.401\HA_UltraAudioRipper-2_CZ.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4ac 0x2b41⤵
- Suspicious use of AdjustPrivilegeToken
PID:3352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
4KB
MD503a477dd69bd11877e2ac1953947c400
SHA1e33881e8203674cc94bc9fcbde3e1f65ed4be5c7
SHA25603c50276af73bb72b533f8936a57bbabe41e3b7d5e24cf60eb32f3b9df2cdd61
SHA512c8d657199b7c2e2d3c9d76897426b1b9f227bd9d341481f059ab1ae6d79514e94620ec6434e32a6a07095350c90a80bfa46384cef12e309ba6f661d2ddac81af
-
Filesize
33KB
MD5e4ec57e8508c5c4040383ebe6d367928
SHA1b22bcce36d9fdeae8ab7a7ecc0b01c8176648d06
SHA2568ad9e47693e292f381da42ddc13724a3063040e51c26f4ca8e1f8e2f1ddd547f
SHA51277d5cf66caf06e192e668fae2b2594e60a498e8e0ccef5b09b9710721a4cdb0c852d00c446fd32c5b5c85e739de2e73cb1f1f6044879fe7d237341bbb6f27822
-
Filesize
3KB
MD59c3488b5e9655d1837c3963ecec33f70
SHA1f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3
SHA25605ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a
SHA5126af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7
-
Filesize
14KB
MD5f7730497c40fed85e359d0a1088d0943
SHA1bfe1d8bf1fd9738065d1bf66eca3b16ce545ec67
SHA256b1726a5f01938db8acc46c12e4d1950dfffc7776d39c8da5ba372a6bdc0d4eab
SHA51223fdeb65ab8c7edd114ea5beaae24c062c8a0df1ac22d16400c2973e903f8658f1356e71d64e06a0126acb8b01003b74e2d88c1f480fd00fed153f03633a2d73
-
Filesize
937B
MD54b8629d8cf90832edfc51d964caadf1a
SHA1ad2bd8ab470dd52063f5370dba9a7b9c72dcc96e
SHA256b4aff5ba2b0eba7c55496a7534a1da0171b8e5e3a9e9143354563829f3861c0a
SHA51258f4a4ef58d1290463f1cb7b2af5a14b6343865a07916de7d86f176f0374169d740a00d108e07f48a4ca7b088cc9a672faa6dc984ba26fecc3197ded1d5cec2e
-
Filesize
9KB
MD5d9a8780c74619a5d6d31415d56762181
SHA12122b7b5f859681b01cc97dc32ea93d3c5b65a5d
SHA256e8b36ebe7661e9a54d1d167678c46c4c82dc6bd666bf561f03d73bef8307fe62
SHA5126ec9bb514c52a3a6ba4188ad81f23222f4a7c43f432d8d4ac23ef6d4b0427f268e783a02a5a3b0f1efebff785fc4a391c708080994ce65a234db1b25c31aa4e9