Overview
overview
7Static
static
3CareUEyes/...es.exe
windows7-x64
6CareUEyes/...es.exe
windows10-2004-x64
6CareUEyes/...le.exe
windows7-x64
7CareUEyes/...le.exe
windows10-2004-x64
7$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDI...sh.dll
windows7-x64
3$PLUGINSDI...sh.dll
windows10-2004-x64
3$PLUGINSDI...ce.dll
windows7-x64
3$PLUGINSDI...ce.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3Analysis
-
max time kernel
131s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 02:23
Static task
static1
Behavioral task
behavioral1
Sample
CareUEyes/App/CareUEyes/CareUEyes.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
CareUEyes/App/CareUEyes/CareUEyes.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
CareUEyes/CareUEyesPortable.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
CareUEyes/CareUEyesPortable.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/MoreInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/MoreInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/execDos.dll
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/execDos.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/newadvsplash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/newtextreplace.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/newtextreplace.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20241007-en
General
-
Target
CareUEyes/App/CareUEyes/CareUEyes.exe
-
Size
5.9MB
-
MD5
b0fcd926564bf3021ecaad98f6125d3e
-
SHA1
f4f68e4294bc86ddab3f3793624e0df0d00c98d4
-
SHA256
4585309f11e0ab5aca1b0c8d4f30652abb5ab5a9858f0b83ca271ef733d4b629
-
SHA512
4ecf001326ae736945a7bc7a625b34a323bd1a1878130143afc05009826e668e70c845526f229433ab38a76ce272d34224db06f7de2e02bb95c949c96c30f92d
-
SSDEEP
98304:dwqCvR1EYwlLAxscPPeL5UF0as1KygCZ0nK1TuBFgJs2zWTIgr:daR1I9AxsRRgW+gq2zWTIU
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CareUEyes = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CareUEyes\\App\\CareUEyes\\CareUEyes.exe /tray" CareUEyes.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CareUEyes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CareUEyes.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\WOW6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533} CareUEyes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\WOW6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533}\uuid = "ZDEzYzRmNTdmMDUyYmI1MGU2YWI2MDljMWQ2Y2MwMmE=" CareUEyes.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\WOW6432Node\CLSID\{FC36FD6A-7586-4ad1-8CBF-EB8AB7A51533} CareUEyes.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2444 CareUEyes.exe 2444 CareUEyes.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2444 CareUEyes.exe 2444 CareUEyes.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 400 CareUEyes.exe 400 CareUEyes.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2444 wrote to memory of 400 2444 CareUEyes.exe 97 PID 2444 wrote to memory of 400 2444 CareUEyes.exe 97 PID 2444 wrote to memory of 400 2444 CareUEyes.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe" /tj2⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD512c1b68f6bc82a4d9eb7bcbb862fba27
SHA154d964c3dd09d646c1aaddf94d2b4d47f31be6bd
SHA25631fd6a007f8b3a92efbdfdda7dc925a9798a75e07afe1809edb240980cc17656
SHA512e206acbe5f09efed7f5de5e33935b11345a544efec81d4ff8dc702c6cd5cce357188bc0d9200a760f9f30b98d0a9f62a4cc6b42c71954d0f4447a77239815a75
-
Filesize
3KB
MD5066eb944ffabae8e11a11569e477e633
SHA1f51ee85dd36df2f602f014e9a613c8cf6eb2b24f
SHA256abe782c86a2ab2010f7dc781ecf719f421e1791b68f4a56c7532a21c5e9d6ac8
SHA512f9debe9b97f54fb8fddc9b31e1afd477c57aae56960aeeb55c42f927488ba64dc7faf1dfc3e025e089b615b00fd74d76ded4b4aadc898bb19c253a917bc7aa7a