Overview
overview
10Static
static
10Ultimate Tweaks.exe
windows7-x64
7Ultimate Tweaks.exe
windows10-2004-x64
$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
3resources/elevate.exe
windows7-x64
3resources/elevate.exe
windows10-2004-x64
3vk_swiftshader.dll
windows7-x64
1vk_swiftshader.dll
windows10-2004-x64
1vulkan-1.dll
windows7-x64
1vulkan-1.dll
windows10-2004-x64
1$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...7z.dll
windows7-x64
3$PLUGINSDI...7z.dll
windows10-2004-x64
3$R0/Uninst...ks.exe
windows7-x64
7$R0/Uninst...ks.exe
windows10-2004-x64
7Analysis
-
max time kernel
91s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 14:15
Behavioral task
behavioral1
Sample
Ultimate Tweaks.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Ultimate Tweaks.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
resources/elevate.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
resources/elevate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
vk_swiftshader.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
vk_swiftshader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
vulkan-1.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
vulkan-1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsis7z.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$R0/Uninstall Ultimate Tweaks.exe
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$R0/Uninstall Ultimate Tweaks.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/app-64.7z
-
Size
76.2MB
-
MD5
8dfb6836a04b97fad58393202c9587b6
-
SHA1
671282ad51b365930cfa4dae262b838669d29b3f
-
SHA256
9e0751d586fdd328522ad3f84873f8be946d966af52596384af4b4c90b7a0158
-
SHA512
103dd876fc27d2051dc6b59c364078197f52cfbba996a15b2bfbeddb511114f02a8062574e3a99018036a27ee83dea93ee1b172fa1d81a360096f98caeb7cea5
-
SSDEEP
1572864:Ee4hJceZcymVkfWx0/sX2ZNt/Ls7fWxZaG2A/oYqb:Ee41t+xy82LtzVxSbf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2312 OpenWith.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2916 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2916 2312 OpenWith.exe 95 PID 2312 wrote to memory of 2916 2312 OpenWith.exe 95
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z1⤵
- Modifies registry class
PID:1664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app-64.7z2⤵
- Suspicious use of FindShellTrayWindow
PID:2916
-