Analysis
-
max time kernel
132s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
Ultimate Password Hacker 2011/Ultimate Password Hacker 2011.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Ultimate Password Hacker 2011/Ultimate Password Hacker 2011.exe
Resource
win10v2004-20241007-en
General
-
Target
Ultimate Password Hacker 2011/Ultimate Password Hacker 2011.exe
-
Size
2.4MB
-
MD5
bdd0969fee3780c98c0bc55db4362ab5
-
SHA1
8f8712d061170a6baad9b6dec57cdfe727bd4886
-
SHA256
aed0d29605b857b18bade968b956cea5e275fc31592c8e4cdd7406abdc1937ad
-
SHA512
aa59de5cd64913a20dbf5b5805f76c4e4789ec97d072a328a1b7cd6f0ca9201fc6ae249b71798fa4c2b31faa3c190da98d25777fe3c2fa46ee6b23009501ed9f
-
SSDEEP
49152:oH2hEobT22ZmDhEKhEiCfbEZq4CKP5ErJ:8K
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Ultimate Password Hacker 2011.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation flesplayer.exe -
Executes dropped EXE 4 IoCs
pid Process 1476 Ultimate Password Hacker 2011.exe 2956 flesplayer.exe 2640 microsoft.exe 756 micromedia.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini Ultimate Password Hacker 2011.exe File opened for modification C:\Windows\assembly\Desktop.ini Ultimate Password Hacker 2011.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly Ultimate Password Hacker 2011.exe File created C:\Windows\assembly\Desktop.ini Ultimate Password Hacker 2011.exe File opened for modification C:\Windows\assembly\Desktop.ini Ultimate Password Hacker 2011.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4368 2640 WerFault.exe 94 3092 756 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ultimate Password Hacker 2011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language microsoft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language micromedia.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1476 Ultimate Password Hacker 2011.exe 2640 microsoft.exe 756 micromedia.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3828 wrote to memory of 1476 3828 Ultimate Password Hacker 2011.exe 89 PID 3828 wrote to memory of 1476 3828 Ultimate Password Hacker 2011.exe 89 PID 3828 wrote to memory of 1476 3828 Ultimate Password Hacker 2011.exe 89 PID 3828 wrote to memory of 2956 3828 Ultimate Password Hacker 2011.exe 91 PID 3828 wrote to memory of 2956 3828 Ultimate Password Hacker 2011.exe 91 PID 2956 wrote to memory of 2640 2956 flesplayer.exe 94 PID 2956 wrote to memory of 2640 2956 flesplayer.exe 94 PID 2956 wrote to memory of 2640 2956 flesplayer.exe 94 PID 2956 wrote to memory of 756 2956 flesplayer.exe 95 PID 2956 wrote to memory of 756 2956 flesplayer.exe 95 PID 2956 wrote to memory of 756 2956 flesplayer.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ultimate Password Hacker 2011\Ultimate Password Hacker 2011.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate Password Hacker 2011\Ultimate Password Hacker 2011.exe"1⤵
- Checks computer location settings
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\Ultimate Password Hacker 2011.exe"C:\Users\Admin\AppData\Local\Temp\Ultimate Password Hacker 2011.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\flesplayer.exe"C:\Users\Admin\AppData\Local\Temp\flesplayer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\microsoft.exe"C:\Users\Admin\AppData\Local\Temp\microsoft.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 4644⤵
- Program crash
PID:4368
-
-
-
C:\Users\Admin\AppData\Local\Temp\micromedia.exe"C:\Users\Admin\AppData\Local\Temp\micromedia.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 4644⤵
- Program crash
PID:3092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2640 -ip 26401⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 756 -ip 7561⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
528KB
MD5225dcd38b695a726888d54f333e75cab
SHA104843136e1572dd0f7756c8cb29c6bc9a5984413
SHA256ac70ff84e1e2935f8140f91e0fbb74ffd671ae96546e46924cb156223817db10
SHA5126d12a9dc1719c3cb8001ee9c4861f7db239cd3f5f07fda693679dec1dd145c77a6f762a6b7970c343869eb77657f97e7d261bf5b5c9aa86839175c3e9533d497
-
Filesize
1.2MB
MD50c17d23d99c9c1b306c4e1d12900d1fa
SHA10b199deda6aa4f894f6b6cadbb07cc9f082f1f54
SHA2567a3253251902b38aa969016cf372efc041114edcbb690cd894f2174cae206559
SHA51207e1b700cdfc33a3efc6c34c6ecf577d3f43605127c4404335b60b8a47fd1bad638a5f43e5bf25e73cf368805dad8858a253cef2ed8f588b893605b879aa9d4b
-
Filesize
93KB
MD5ed2567a7f32595ae534c9585616d8da9
SHA1794dda2f0937704b1d0a95c9a4d42ecf2bdf5818
SHA256c1d9201194905de6ab87d40e7dae12e50acf41238e14ad419d61faa73ffa16fd
SHA512dd006609475a303f20f279cef38f60a972e29a2e24a14544fc88732312cb329008de5c6bb19b27dadddf91f8f6661d2d07771583b4012d2d6a375506a1e4b480
-
Filesize
718KB
MD5e5eb5f11d14169b9ff82b79ebbe68aef
SHA1a855cf3aab0b1b8897fcfd39d4f749fcee2f623f
SHA25625bf774b16b62ea94775be0d498b28104d474c099e968ae8f1344f5197e28771
SHA5129879d04c8be54931d57ae748418e6b8ec43517bc19bfb05fe0a43e9ee0d3cf078f9ebc3ef722deed706d7b5765364d2ef9cc13f0b1c7d3a91154fa6f00e82816