Analysis

  • max time kernel
    131s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 02:23

General

  • Target

    CareUEyes/App/CareUEyes/CareUEyes.exe

  • Size

    5.9MB

  • MD5

    b0fcd926564bf3021ecaad98f6125d3e

  • SHA1

    f4f68e4294bc86ddab3f3793624e0df0d00c98d4

  • SHA256

    4585309f11e0ab5aca1b0c8d4f30652abb5ab5a9858f0b83ca271ef733d4b629

  • SHA512

    4ecf001326ae736945a7bc7a625b34a323bd1a1878130143afc05009826e668e70c845526f229433ab38a76ce272d34224db06f7de2e02bb95c949c96c30f92d

  • SSDEEP

    98304:dwqCvR1EYwlLAxscPPeL5UF0as1KygCZ0nK1TuBFgJs2zWTIgr:daR1I9AxsRRgW+gq2zWTIU

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe
    "C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2444
    • C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe
      "C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe" /tj
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\careueyes\setting_v2.dat

    Filesize

    3KB

    MD5

    12c1b68f6bc82a4d9eb7bcbb862fba27

    SHA1

    54d964c3dd09d646c1aaddf94d2b4d47f31be6bd

    SHA256

    31fd6a007f8b3a92efbdfdda7dc925a9798a75e07afe1809edb240980cc17656

    SHA512

    e206acbe5f09efed7f5de5e33935b11345a544efec81d4ff8dc702c6cd5cce357188bc0d9200a760f9f30b98d0a9f62a4cc6b42c71954d0f4447a77239815a75

  • C:\Users\Admin\AppData\Roaming\careueyes\setting_v2.dat

    Filesize

    3KB

    MD5

    066eb944ffabae8e11a11569e477e633

    SHA1

    f51ee85dd36df2f602f014e9a613c8cf6eb2b24f

    SHA256

    abe782c86a2ab2010f7dc781ecf719f421e1791b68f4a56c7532a21c5e9d6ac8

    SHA512

    f9debe9b97f54fb8fddc9b31e1afd477c57aae56960aeeb55c42f927488ba64dc7faf1dfc3e025e089b615b00fd74d76ded4b4aadc898bb19c253a917bc7aa7a

  • memory/400-30-0x0000000003080000-0x0000000003090000-memory.dmp

    Filesize

    64KB

  • memory/400-43-0x0000000003080000-0x0000000003090000-memory.dmp

    Filesize

    64KB

  • memory/2444-0-0x0000000037A00000-0x0000000037A10000-memory.dmp

    Filesize

    64KB

  • memory/2444-1-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/2444-25-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB