Overview
overview
7Static
static
3ebbbc24032...18.exe
windows7-x64
7ebbbc24032...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3KRyLack_So...te.url
windows7-x64
6KRyLack_So...te.url
windows10-2004-x64
3Ultimate_K...te.url
windows7-x64
6Ultimate_K...te.url
windows10-2004-x64
3ulklfemon.dll
windows7-x64
3ulklfemon.dll
windows10-2004-x64
3ultimateke...ee.chm
windows7-x64
1ultimateke...ee.chm
windows10-2004-x64
1ultimateke...ee.exe
windows7-x64
6ultimateke...ee.exe
windows10-2004-x64
7unukfree.exe
windows7-x64
7unukfree.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
ebbbc2403206de2fc892271dba0641fe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebbbc2403206de2fc892271dba0641fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
KRyLack_Software_Website.url
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
KRyLack_Software_Website.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Ultimate_Keylogger_Website.url
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Ultimate_Keylogger_Website.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ulklfemon.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
ulklfemon.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ultimatekeyloggerfree.chm
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ultimatekeyloggerfree.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ultimatekeyloggerfree.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
ultimatekeyloggerfree.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
unukfree.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
unukfree.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
General
-
Target
ultimatekeyloggerfree.exe
-
Size
1.2MB
-
MD5
ae9d3886eed492eac3388ce0b64e9e7c
-
SHA1
3f040afccabf5a3cfb033f0b058d1ec1bba6d027
-
SHA256
eac3e306fef7caed9829705363fa762a5cc57b99a2cc87020f7375c44d5c3ea6
-
SHA512
484fde4cbde2abd645470c28bd4cc08eb5fbf5596043a9dd5830fceac01fe6a5c8d626d0af77d68815646ef74663edc35921cc9e079b7a4e0c9a079251ce6156
-
SSDEEP
24576:uYmEOHVqgKhEcHhWJavPFOmlYH0cY3vx5yC9JYwAtAnG1EQ5N14fubaWMUnX:TU1RKF6aHcOmcxN9JbIAnmnaWMUnX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629364133-3182087385-364449604-1000\Control Panel\International\Geo\Nation ultimatekeyloggerfree.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3164 4460 WerFault.exe 87 3480 4460 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ultimatekeyloggerfree.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ultimatekeyloggerfree.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4128 ultimatekeyloggerfree.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe -
Suspicious use of SendNotifyMessage 47 IoCs
pid Process 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe 4128 ultimatekeyloggerfree.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4460 4128 ultimatekeyloggerfree.exe 87 PID 4128 wrote to memory of 4460 4128 ultimatekeyloggerfree.exe 87 PID 4128 wrote to memory of 4460 4128 ultimatekeyloggerfree.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\ultimatekeyloggerfree.exe"C:\Users\Admin\AppData\Local\Temp\ultimatekeyloggerfree.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\ultimatekeyloggerfree.exe"C:\Users\Admin\AppData\Local\Temp\ultimatekeyloggerfree.exe" -install2⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 2523⤵
- Program crash
PID:3164
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 3043⤵
- Program crash
PID:3480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4460 -ip 44601⤵PID:1180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 4460 -ip 44601⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
899B
MD58d5af284710a5cff1541189f1cc3aabc
SHA131656ce0a306e071911abda2a1ea462e4797e0c0
SHA256490b2ac90c4958667457d5ece3c5d8ada6c3f7da12c22f8b95aecd3995264a27
SHA51287b83ff160bcae8999c856c77924417fb588a4e346573f730017f8dacfb156004186ff08591efbce6eeab31262120ed97edbf76d8a91c69c6a441b40b68d57f1
-
Filesize
899B
MD5411ddf2e0681ae4bf4dd7fe1917db787
SHA1117a98f2e243a47eb3b103fa5996b20f8597680e
SHA256348078a305fee69429ae5bdd6d8524a3a5b9f0b0417c95fc9d1a43309cbae471
SHA512320b5d4853f732350a91469bf482130cbc6c683436f5b520d2d72c39dbb1ae445c714a8452de33769cf6df3df66338da108f126c540e59e7afd340bfbfc33a9b
-
Filesize
899B
MD5e75c3f221f40d17beb876e878e68f42b
SHA1cad1302ac153a8f30a8816d4d3c843f6d3f77b89
SHA25671b18d6d3089e63dd40064c6e849f794eaed04c24df4bdacd18e8824c99e5cbe
SHA51256201ed6be639021aa4f2c04a478847f07499d6f8d58972949a1f27ecf365cbc6d709508d7523db3ab487f2276c7cd871832eda698daf09a30797a26ecdf63e9
-
Filesize
3.5MB
MD52f27fc15ddadeb29206d4236ff8d3739
SHA13abc0140f6d2a15adf98ee91b98b9a555bae542d
SHA256a37e35ffe6e0e77d5362831369e340381dbd78b5d89ed48bec9cd6f7fa827564
SHA5125ab7a3f455c0a87c2db0f8611733a4d51c4000c9bc0a91e9f818c0a560b32be3dc938a70086832d430921903379b5ea3b861ee6506c7f195d10290d00060d47e
-
Filesize
3.5MB
MD54657f143a94f9c243be486c9a5181690
SHA15b5383d077ef7e4beb566a75e13ec26e2bc089ce
SHA25690c6b87e68b035eefb8bbd7c83913927a6d38da55ee934928d29cf204fef616b
SHA51261d93c0b0ea76052d64a5c0cee0fe7b311a6a024b3934cdcdb05da6de0208b9901813758ed9e9af705c74a18c8ccec3c1480c097e6561703cb9a13ad04ff8c5c
-
Filesize
76KB
MD5aa20fb5fcdb5d08d5d13a3fac18fc56c
SHA18bb658458337e676c9e39af57bcda10d5428e2a5
SHA256a78dff201dd7b6b9c54850ec15608abaa18910778f6db560aedce59a8650fb80
SHA51211ffe160a7a4696b39c7042204b8bbfe9eb56e3baf2bbe7ca5b1b8aa5ce49e87054fee810e02782f2fec0309f8ff7a0d7a59915fcef2341fc4f26a37d1e0484e
-
Filesize
4KB
MD550d44bba30a9cbcebf5838eda6f5174e
SHA1c010fb9468c1d3d3ff962f2c6928ba65b9b14099
SHA256706e5d69b2ffd0d2bb0d30379387f6476399fbd9422e8a8680f2ec4b20df9124
SHA512d951f7e93a3e7d1e951df7a58b28f9e4d7f53156b329ca5a65dadb9637fcab750c9c408966f37936f1c7ab52be3613520d68cad70af5fa87298e003492d206f9