Analysis

  • max time kernel
    131s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15/10/2024, 02:23

General

  • Target

    CareUEyes/CareUEyesPortable.exe

  • Size

    144KB

  • MD5

    1c959ca67730a5bc21d17d3d0153e2df

  • SHA1

    a41a306563e5b7430f0d4ce3f0620eca3e69da54

  • SHA256

    b07d2acf6197e436eee90c95561342d676422726e5b63a40403df0074a1b5973

  • SHA512

    d3f11383685b73dd66ced31e96d8ee36892657b20596e99437671308700f322b45e5367581ae2e42eb92f79fa88610c62cbcb22fcf7da451e4b8865c3b4a4713

  • SSDEEP

    3072:lqeqOYEUXPnU7b97o6c9jHtn16p8osnBV0mp0TLZX:kEUX2b9+jNnQCLBVwB

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CareUEyes\CareUEyesPortable.exe
    "C:\Users\Admin\AppData\Local\Temp\CareUEyes\CareUEyesPortable.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe
      "C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe
        "C:\Users\Admin\AppData\Local\Temp\CareUEyes\App\CareUEyes\CareUEyes.exe" /tj
        3⤵
        • System Location Discovery: System Language Discovery
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\CareUEyes\Data\settings\CareUEyes.reg

          Filesize

          248B

          MD5

          2af074816d8777f8e63ce07b085629d2

          SHA1

          2e43f6ddb68630f36c73bede2fd6c3580aeabc95

          SHA256

          fe25a9d79f7044562d19de6122f25e5623c6cbbc9d95dd0a0427b843dad50fb8

          SHA512

          a7eb3ed13dd0194292221ef6f5531dd5c6c4bce89176631decd9283dddaf61b0d519add9241ddf15a96c85c5b4bf0714711cfe114afce9beb1c97c71031ffb84

        • C:\Users\Admin\AppData\Local\Temp\nsoD7EA.tmp\launcher.ini

          Filesize

          1KB

          MD5

          016566e48414fcdd21bb9ca842f6b1ef

          SHA1

          fd22292fa424a791467e407dee3f42d6e1f0a072

          SHA256

          bc87bbd32fef165dd457b4d17661565fecaa4f8875484fb3298dbe1b0df1f1cc

          SHA512

          b961a014c1434bb38c1bda7e6e118f509a1262674924746de705aa77ee8c09d07e65a1a615c6fc21fa76aca5305e41e8b7091c83f163edacde60e6b49116797e

        • C:\Users\Admin\AppData\Roaming\careueyes\setting_v2.dat

          Filesize

          2KB

          MD5

          9b252d2c5b1381e51fb8543b1ea95188

          SHA1

          e2595aed80f2b8ba8ce45918e2e6fc1ed0c612e2

          SHA256

          8750a23be64cb16047007bd9850b57378e61a631d7487f0029b08a24ef58c27f

          SHA512

          d0feff27cb7728d2571a377485681ed3ed784d3577624afdc9e25f1aa8e7a3eecf783d4648795a9ec15e285f4beeb11988d3d264308d0cb0003183cd0501229e

        • C:\Users\Admin\AppData\Roaming\careueyes\setting_v2.dat

          Filesize

          2KB

          MD5

          f9c98267651c0d45fabe14153acf0a5a

          SHA1

          f3ba062ce2a0f2aa1eda929a2942b01f8a8d0094

          SHA256

          577ef6463149ca906da59de2622c9f1c092336953f16cc1818e414f1b8d209ec

          SHA512

          76b0ca61d70517815930fee3476e2bc60ef252100f8a2a5cd570f50ff2f236ae056cd2655a8c659607837239f0b015344d229a991cc913c7fa4caac28a027a52

        • \Users\Admin\AppData\Local\Temp\nsoD7EA.tmp\System.dll

          Filesize

          11KB

          MD5

          bf712f32249029466fa86756f5546950

          SHA1

          75ac4dc4808ac148ddd78f6b89a51afbd4091c2e

          SHA256

          7851cb12fa4131f1fee5de390d650ef65cac561279f1cfe70ad16cc9780210af

          SHA512

          13f69959b28416e0b8811c962a49309dca3f048a165457051a28a3eb51377dcaf99a15e86d7eee8f867a9e25ecf8c44da370ac8f530eeae7b5252eaba64b96f4

        • \Users\Admin\AppData\Local\Temp\nsoD7EA.tmp\newtextreplace.dll

          Filesize

          11KB

          MD5

          b5358341df2cb171876a5f201e31a834

          SHA1

          df34750ea5504274be5ff8ddd306b49e302d04f9

          SHA256

          156b9b583399faf13c4d46b89339fb0f7f38dc847ac2d7872178d8e3998b9734

          SHA512

          821dc42e24fa2d44a1d4d16b26c3da2688dac0fa44a266e38da2aff706c91440d83a87abc74131930e6c38a44a0c5e627db2d045375fde147e0edd3276f4b014

        • \Users\Admin\AppData\Local\Temp\nsoD7EA.tmp\registry.dll

          Filesize

          29KB

          MD5

          2880bf3bbbc8dcaeb4367df8a30f01a8

          SHA1

          cb5c65eae4ae923514a67c95ada2d33b0c3f2118

          SHA256

          acb79c55b3b9c460d032a6f3aaf6c642bf8c1d450e23279d091cc0c6ca510973

          SHA512

          ca978702ce7aa04f8d9781a819a57974f9627e969138e23e81e0792ff8356037c300bb27a37a9b5c756220a7788a583c8e40cc23125bcbe48849561b159c4fa3

        • memory/2252-67-0x0000000034F30000-0x0000000034F40000-memory.dmp

          Filesize

          64KB

        • memory/2252-72-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB

        • memory/2252-97-0x0000000002B20000-0x0000000002B60000-memory.dmp

          Filesize

          256KB