Overview
overview
10Static
static
10Furk-Ultra...ss.bat
windows7-x64
7Furk-Ultra...ss.bat
windows10-2004-x64
8Furk-Ultra...ra.exe
windows7-x64
6Furk-Ultra...ra.exe
windows10-2004-x64
6Furk-Ultra...it.dll
windows7-x64
1Furk-Ultra...it.dll
windows10-2004-x64
1Furk-Ultra...on.dll
windows7-x64
1Furk-Ultra...on.dll
windows10-2004-x64
1Furk-Ultra... V2.js
windows7-x64
3Furk-Ultra... V2.js
windows10-2004-x64
3Furk-Ultra...ock.js
windows7-x64
3Furk-Ultra...ock.js
windows10-2004-x64
3Furk-Ultra...der.js
windows7-x64
3Furk-Ultra...der.js
windows10-2004-x64
3Furk-Ultra...ipt.js
windows7-x64
3Furk-Ultra...ipt.js
windows10-2004-x64
3Furk-Ultra...rer.js
windows7-x64
3Furk-Ultra...rer.js
windows10-2004-x64
3Furk-Ultra...Hub.js
windows7-x64
3Furk-Ultra...Hub.js
windows10-2004-x64
3Furk-Ultra...ass.js
windows7-x64
3Furk-Ultra...ass.js
windows10-2004-x64
3Furk-Ultra...ode.js
windows7-x64
3Furk-Ultra...ode.js
windows10-2004-x64
3Furk-Ultra...ce.dll
windows7-x64
1Furk-Ultra...ce.dll
windows10-2004-x64
1Furk-Ultra...ss.exe
windows7-x64
7Furk-Ultra...ss.exe
windows10-2004-x64
8Furk-Ultra...s1.exe
windows7-x64
7Furk-Ultra...s1.exe
windows10-2004-x64
7Furk-Ultra...er.dll
windows7-x64
3Furk-Ultra...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 04:46
Behavioral task
behavioral1
Sample
Furk-Ultra-main/Bypass.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Furk-Ultra-main/Bypass.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Furk-Ultra-main/FurkUltra.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Furk-Ultra-main/FurkUltra.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Furk-Ultra-main/ICSharpCode.AvalonEdit.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Furk-Ultra-main/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Furk-Ultra-main/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Furk-Ultra-main/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Furk-Ultra-main/Scripts/Dex Explorer V2.js
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Furk-Ultra-main/Scripts/Dex Explorer V2.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Furk-Ultra-main/Scripts/FPS Aimlock.js
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Furk-Ultra-main/Scripts/FPS Aimlock.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Furk-Ultra-main/Scripts/Hitbox Extender.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Furk-Ultra-main/Scripts/Hitbox Extender.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Furk-Ultra-main/Scripts/Kick Off Script.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Furk-Ultra-main/Scripts/Kick Off Script.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Furk-Ultra-main/Scripts/Old DEX Explorer.js
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Furk-Ultra-main/Scripts/Old DEX Explorer.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Furk-Ultra-main/Scripts/TopKek ScriptHub.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Furk-Ultra-main/Scripts/TopKek ScriptHub.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Furk-Ultra-main/Scripts/[FE] Chat Bypass.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Furk-Ultra-main/Scripts/[FE] Chat Bypass.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Furk-Ultra-main/Scripts/[FE] God Mode.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Furk-Ultra-main/Scripts/[FE] God Mode.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Furk-Ultra-main/System.Diagnostics.DiagnosticSource.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Furk-Ultra-main/System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Furk-Ultra-main/bin/Bypass.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Furk-Ultra-main/bin/Bypass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Furk-Ultra-main/bin/Bypass1.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Furk-Ultra-main/bin/Bypass1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Furk-Ultra-main/bin/Helper.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Furk-Ultra-main/bin/Helper.dll
Resource
win10v2004-20241007-en
General
-
Target
Furk-Ultra-main/Bypass.bat
-
Size
61B
-
MD5
ed9b8d9a7a6855bd7542906c89df7d59
-
SHA1
2fb50de53bb455b43cfe3f52032b245c2c50a3fc
-
SHA256
c29fe90eeae955d900405ff44043bdba6d2b76504a1f606dd87f97bcfd61ffa6
-
SHA512
bf2f3138353973f64ac93971fbf50e8ed8f6fb21d38f4c5a7940fb7077323df424da54c9ddcf172280dee97b0caa052eda09466dfc3e3bcc318235d97ff15219
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2660 Bypass.exe 680 Bypass1.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 3 raw.githubusercontent.com -
resource yara_rule behavioral1/files/0x0005000000019387-23.dat upx behavioral1/files/0x000500000001c85e-138.dat upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1060 2236 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FurkUltra.exe -
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2236 FurkUltra.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe 2236 FurkUltra.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 FurkUltra.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2236 3004 cmd.exe 31 PID 3004 wrote to memory of 2236 3004 cmd.exe 31 PID 3004 wrote to memory of 2236 3004 cmd.exe 31 PID 3004 wrote to memory of 2236 3004 cmd.exe 31 PID 3004 wrote to memory of 2684 3004 cmd.exe 32 PID 3004 wrote to memory of 2684 3004 cmd.exe 32 PID 3004 wrote to memory of 2684 3004 cmd.exe 32 PID 2684 wrote to memory of 2660 2684 Bypass.exe 33 PID 2684 wrote to memory of 2660 2684 Bypass.exe 33 PID 2684 wrote to memory of 2660 2684 Bypass.exe 33 PID 3004 wrote to memory of 2568 3004 cmd.exe 34 PID 3004 wrote to memory of 2568 3004 cmd.exe 34 PID 3004 wrote to memory of 2568 3004 cmd.exe 34 PID 2568 wrote to memory of 680 2568 Bypass1.exe 35 PID 2568 wrote to memory of 680 2568 Bypass1.exe 35 PID 2568 wrote to memory of 680 2568 Bypass1.exe 35 PID 2236 wrote to memory of 1060 2236 FurkUltra.exe 36 PID 2236 wrote to memory of 1060 2236 FurkUltra.exe 36 PID 2236 wrote to memory of 1060 2236 FurkUltra.exe 36 PID 2236 wrote to memory of 1060 2236 FurkUltra.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\Bypass.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\FurkUltra.exeFurkUltra.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 12883⤵
- Program crash
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass.exeBypass.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass.exeBypass.exe3⤵
- Loads dropped DLL
PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass1.exeBypass1.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\bin\Bypass1.exeBypass1.exe3⤵
- Loads dropped DLL
PID:680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
1.6MB
MD55f6fd64ec2d7d73ae49c34dd12cedb23
SHA1c6e0385a868f3153a6e8879527749db52dce4125
SHA256ff9f102264d1944fbfae2ba70e7a71435f51a3e8c677fd970b621c4c9ea71967
SHA512c4be2d042c6e4d22e46eacfd550f61b8f55814bfe41d216a4df48382247df70bc63151068513855aa78f9b3d2f10ba6a824312948324c92de6dd0f6af414e8ab