Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 03:25
Static task
static1
Behavioral task
behavioral1
Sample
ufsxpci.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ufsxpci.exe
Resource
win10v2004-20241007-en
General
-
Target
ufsxpci.exe
-
Size
41.8MB
-
MD5
cc6cf30e86d774df9a3b3ffdc3f8c7ed
-
SHA1
ebad1a99ba436548a8115846e2ebae3b19b11c9c
-
SHA256
0c939890c3cbc24675e353eaa90f791f0f8d57d3bc40394c125cf54aa00a8fa6
-
SHA512
130daaba55d8c84b0afdca4681bd158da32ea1751c3a548a1c2223b00b3626212d440d027d50ef66533d4c67233c8cff3c2e6f9f640dc21336baed4c1b3a94bb
-
SSDEEP
786432:lYi145b7jnv4Gsfgcld7LiuChEuuh1qK9O7LsbEDhp8eHk:O7b7jnwpfxld4hCn9OPsbrP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ufsxpci.exe -
Executes dropped EXE 2 IoCs
pid Process 1344 ufs-explorer-pro.exe 3700 softmanager.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: ufs-explorer-pro.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ufs-explorer-pro.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Data Recovery\report-templates\dynamic-report-sample04-show-total-size.htm.tmp ufsxpci.exe File created C:\Program Files\Common Files\SysDev Laboratories\softmanager.exe.tmp ufsxpci.exe File created C:\Program Files\Data Recovery\ufs-explorer-pro.exe.tmp ufsxpci.exe File created C:\Program Files\Data Recovery\report-templates\dynamic-report-sample01-ufsx_pro.htm.tmp ufsxpci.exe File created C:\Program Files\Data Recovery\report-templates\dynamic-report-sample02-logo.htm.tmp ufsxpci.exe File created C:\Program Files\Data Recovery\report-templates\dynamic-report-sample03-tools.htm.tmp ufsxpci.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufsxpci.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language softmanager.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe 1344 ufs-explorer-pro.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1344 ufs-explorer-pro.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4280 wrote to memory of 1344 4280 ufsxpci.exe 92 PID 4280 wrote to memory of 1344 4280 ufsxpci.exe 92 PID 1344 wrote to memory of 3700 1344 ufs-explorer-pro.exe 93 PID 1344 wrote to memory of 3700 1344 ufs-explorer-pro.exe 93 PID 1344 wrote to memory of 3700 1344 ufs-explorer-pro.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ufsxpci.exe"C:\Users\Admin\AppData\Local\Temp\ufsxpci.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Program Files\Data Recovery\ufs-explorer-pro.exe"C:\Program Files\Data Recovery\ufs-explorer-pro.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files\Common Files\SysDev Laboratories\softmanager.exe"C:/Program Files/Common Files/SysDev Laboratories/softmanager.exe" update ufsx_p quite 03⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD54140d4d94e98c0aca371ac6726946e0e
SHA19d382f52b977930c036d1ff86b84a6720bf17b58
SHA25602c06c13f2a10c1d398ccfb4911aac226f881fea4caef6aa78d5221c2d00a8b0
SHA512f39372eeefd8e58f1b4b4e289a3260f8b6f7f17c009dc7813ee191037acdfe3d166c28062fb5a2749ca6750756590dcdf03580cdee7947650e490c160269f4e8
-
Filesize
24.3MB
MD50aa68ad50c70c9f4278b387492bbd2ab
SHA175c418ea978621389c03210d4d65ff898feefd33
SHA2566b62c68d4f5e9e6bab16f3ca80b1fcd8dcef6939d32f941cdda04b38f9d39060
SHA512a11ff316fbf036ca9fd22a7e9ac5b29c75b7b6ae270a2a77866a9ef424eafd289a4015f68516d1df8f9c91ec4a658b5b080830fbcc2757d937f86bf1e66e33d0
-
Filesize
1KB
MD5f62772c7b9aa424fc561538fef757fde
SHA1ee78c9f43f42fc75e173cc39da8feb6091ecb9ad
SHA25644cf6a53bb89b9962abf490541b5aaffb89f54aa0a453da0e8e8d3d0991a2ec5
SHA51221381b40810862116b558910b66febe489d9fbcbe6b2d100ff0adbddf964521f284534d7572d0af30b6f59ca77093d3861b1abb37bd77224770588be6a67ee2f
-
Filesize
199B
MD5af155972bd28d0a98854d1557863b0e8
SHA1f71880f861c1fbe97ccab1d5573eee17ac95ce71
SHA2568d837eb8cc6c07f0162c321cac10c0f0d7bbe0bf67df517efefcab83603c02e7
SHA512f7f51eb7ceda6aa525898f0a3da587b306fa9ababceb2fcb9a80e65b2577749a501755f21aa54e88924a6610f8d3bf1bd1b98bd0e6fbd36c03378d8bbd502f59
-
Filesize
22B
MD5f110c0f548ee0a4b31d063ccd418196e
SHA11bb5661c0d4efc0bbc1faf0c33b429fcbccc831c
SHA2561822d2d0b91796efd5329a46d052eb9991bcbee2337a6e0b3198c437fadec7d3
SHA51272decba5f59d28bfd2b2fce8810296c1b602e9fb93ebc3a49df857d10fb34562c963b9b266a759e9ca88009c0022a44d220045604348af37263f332935bdab6e
-
Filesize
24B
MD550821bbc9f67d03c933b50a47428177e
SHA18d6347c71adced44453d3d79850f9cf48b8bf916
SHA25603342e0c2d49ecc5ea74c3cb92c2c8316072e325762cfae5cb145405da99d1d5
SHA512d0e50debcd5ed4ea8eff1c1df64f611bb2bbdc799958b0d451482235c265c973404fba64decfea1df97660d2e15b5af55e2514841bce4ae22cca5c2c60550335