Overview
overview
7Static
static
3ebbbc24032...18.exe
windows7-x64
7ebbbc24032...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
3KRyLack_So...te.url
windows7-x64
6KRyLack_So...te.url
windows10-2004-x64
3Ultimate_K...te.url
windows7-x64
6Ultimate_K...te.url
windows10-2004-x64
3ulklfemon.dll
windows7-x64
3ulklfemon.dll
windows10-2004-x64
3ultimateke...ee.chm
windows7-x64
1ultimateke...ee.chm
windows10-2004-x64
1ultimateke...ee.exe
windows7-x64
6ultimateke...ee.exe
windows10-2004-x64
7unukfree.exe
windows7-x64
7unukfree.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 16:27
Static task
static1
Behavioral task
behavioral1
Sample
ebbbc2403206de2fc892271dba0641fe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ebbbc2403206de2fc892271dba0641fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
KRyLack_Software_Website.url
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
KRyLack_Software_Website.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Ultimate_Keylogger_Website.url
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Ultimate_Keylogger_Website.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
ulklfemon.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
ulklfemon.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
ultimatekeyloggerfree.chm
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
ultimatekeyloggerfree.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
ultimatekeyloggerfree.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
ultimatekeyloggerfree.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral21
Sample
unukfree.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
unukfree.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240802-en
General
-
Target
unukfree.exe
-
Size
104KB
-
MD5
36f2c316d28bb22b746cd26e3e66ea81
-
SHA1
74cb4e47caae20d2e192b028fc6e5147c6a6ab4d
-
SHA256
01d0b09052dadc41652ebde5ca5f1879860c4eaedb85a9b240397fbf9728ecca
-
SHA512
5a925756ef86a440291dd25700072346f5480b207ad138256036792aafe0351889d21ca883c7d0e6e9b6bd45a5887f3fa6d15e4cfea6665b1d38856102474fd3
-
SSDEEP
1536:eQpQ5EP0ijnRTXJ+YRN6QcI0oMUgco9HoDunLSg5LP+R0WWcqFmKEEwBI3:eQIURTXJ+qLMUgUipWWcqkKEN2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2236 Au_.exe -
Loads dropped DLL 3 IoCs
pid Process 2304 unukfree.exe 2236 Au_.exe 2236 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unukfree.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral21/files/0x000500000001926b-2.dat nsis_installer_1 behavioral21/files/0x000500000001926b-2.dat nsis_installer_2 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2236 Au_.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2236 2304 unukfree.exe 30 PID 2304 wrote to memory of 2236 2304 unukfree.exe 30 PID 2304 wrote to memory of 2236 2304 unukfree.exe 30 PID 2304 wrote to memory of 2236 2304 unukfree.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\unukfree.exe"C:\Users\Admin\AppData\Local\Temp\unukfree.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
688B
MD5a852f70e71d86b96b654586e8b21dcde
SHA10ef33656e648798aaebd57c59ecde53e8e1568c9
SHA256268705abedeedbd4a336f7d409175810b878ba76a9a0568f3209c80b8cd3d5ad
SHA51265c0e182dd137241df3ee2d9e3d833232a3213109edc11306d0224e97770e65ffe812623c9757068c8e55c4e429c67caf08f84a1ea08e361515ac0226c4918cc
-
Filesize
727B
MD5a7422c56ecd06aa3eeb17d8477859b10
SHA1d1b83bc83b7d8a1bbfd1303845ded808d66f599c
SHA2565ef8c1f7e567b3b3cf98eb86b9757eea0326c84205b9d405b2788bf29657b0ba
SHA512700be1e3fe8b690d75ca3b6aeee5ca0097f66a8e7ffc10a9aea49b3b914a6b92131f8d5a74a1d444847b3f1ee73505037bbe70f32e00df8768430c7a069a43b4
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
13KB
MD507841403d5371183c4eaa5cab50663fb
SHA1b0cee6e01502fdd2ee775922051333d626c63906
SHA2563a18cf504265ab2267e1545106217767877fa9db6e2b5dd0a3a761dead33a99b
SHA512436c1932d4ff56a11673beac5416ac0f2c7e90e5b993b3b8c8f589069d655da40c3ed514b99291ddf06aad66b0a634896daac19adf459ff791dccf3234af0e05
-
Filesize
104KB
MD536f2c316d28bb22b746cd26e3e66ea81
SHA174cb4e47caae20d2e192b028fc6e5147c6a6ab4d
SHA25601d0b09052dadc41652ebde5ca5f1879860c4eaedb85a9b240397fbf9728ecca
SHA5125a925756ef86a440291dd25700072346f5480b207ad138256036792aafe0351889d21ca883c7d0e6e9b6bd45a5887f3fa6d15e4cfea6665b1d38856102474fd3