Overview
overview
10Static
static
10Furk-Ultra...ss.bat
windows7-x64
7Furk-Ultra...ss.bat
windows10-2004-x64
8Furk-Ultra...ra.exe
windows7-x64
6Furk-Ultra...ra.exe
windows10-2004-x64
6Furk-Ultra...it.dll
windows7-x64
1Furk-Ultra...it.dll
windows10-2004-x64
1Furk-Ultra...on.dll
windows7-x64
1Furk-Ultra...on.dll
windows10-2004-x64
1Furk-Ultra... V2.js
windows7-x64
3Furk-Ultra... V2.js
windows10-2004-x64
3Furk-Ultra...ock.js
windows7-x64
3Furk-Ultra...ock.js
windows10-2004-x64
3Furk-Ultra...der.js
windows7-x64
3Furk-Ultra...der.js
windows10-2004-x64
3Furk-Ultra...ipt.js
windows7-x64
3Furk-Ultra...ipt.js
windows10-2004-x64
3Furk-Ultra...rer.js
windows7-x64
3Furk-Ultra...rer.js
windows10-2004-x64
3Furk-Ultra...Hub.js
windows7-x64
3Furk-Ultra...Hub.js
windows10-2004-x64
3Furk-Ultra...ass.js
windows7-x64
3Furk-Ultra...ass.js
windows10-2004-x64
3Furk-Ultra...ode.js
windows7-x64
3Furk-Ultra...ode.js
windows10-2004-x64
3Furk-Ultra...ce.dll
windows7-x64
1Furk-Ultra...ce.dll
windows10-2004-x64
1Furk-Ultra...ss.exe
windows7-x64
7Furk-Ultra...ss.exe
windows10-2004-x64
8Furk-Ultra...s1.exe
windows7-x64
7Furk-Ultra...s1.exe
windows10-2004-x64
7Furk-Ultra...er.dll
windows7-x64
3Furk-Ultra...er.dll
windows10-2004-x64
3Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05-11-2024 04:46
Behavioral task
behavioral1
Sample
Furk-Ultra-main/Bypass.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Furk-Ultra-main/Bypass.bat
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Furk-Ultra-main/FurkUltra.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Furk-Ultra-main/FurkUltra.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Furk-Ultra-main/ICSharpCode.AvalonEdit.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Furk-Ultra-main/ICSharpCode.AvalonEdit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Furk-Ultra-main/Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Furk-Ultra-main/Newtonsoft.Json.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Furk-Ultra-main/Scripts/Dex Explorer V2.js
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
Furk-Ultra-main/Scripts/Dex Explorer V2.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Furk-Ultra-main/Scripts/FPS Aimlock.js
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Furk-Ultra-main/Scripts/FPS Aimlock.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Furk-Ultra-main/Scripts/Hitbox Extender.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Furk-Ultra-main/Scripts/Hitbox Extender.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Furk-Ultra-main/Scripts/Kick Off Script.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Furk-Ultra-main/Scripts/Kick Off Script.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Furk-Ultra-main/Scripts/Old DEX Explorer.js
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
Furk-Ultra-main/Scripts/Old DEX Explorer.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Furk-Ultra-main/Scripts/TopKek ScriptHub.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Furk-Ultra-main/Scripts/TopKek ScriptHub.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Furk-Ultra-main/Scripts/[FE] Chat Bypass.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Furk-Ultra-main/Scripts/[FE] Chat Bypass.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Furk-Ultra-main/Scripts/[FE] God Mode.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Furk-Ultra-main/Scripts/[FE] God Mode.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Furk-Ultra-main/System.Diagnostics.DiagnosticSource.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Furk-Ultra-main/System.Diagnostics.DiagnosticSource.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Furk-Ultra-main/bin/Bypass.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Furk-Ultra-main/bin/Bypass.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Furk-Ultra-main/bin/Bypass1.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Furk-Ultra-main/bin/Bypass1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Furk-Ultra-main/bin/Helper.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Furk-Ultra-main/bin/Helper.dll
Resource
win10v2004-20241007-en
General
-
Target
Furk-Ultra-main/FurkUltra.exe
-
Size
939KB
-
MD5
ae40aa4a810011454626af870b5af1a6
-
SHA1
36d59c0bbd384b649d0ca54868be5199729aa78a
-
SHA256
1f79fa84d8edcf581380c9129f5e392d778d48c8f815f331871d74a95a16d397
-
SHA512
a60063b50fbeab343667f463715a9db0194194314ee538383dc11a7693c21aee30345aeb0dc39d0ad494b7d841a87475d16e6b2ec0d78c40eb78fa09220a4a5c
-
SSDEEP
12288:+jabtvyU7RBv4XpnMQ9Nx3Ug+YL4UIHDPJKDbn2mFX1WpZOVXfTpU4n81yyU9:vUUbG9zE5YLv29K+mFX1WLkbpUPyV
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2904 2332 WerFault.exe FurkUltra.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FurkUltra.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FurkUltra.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
FurkUltra.exepid process 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe 2332 FurkUltra.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
FurkUltra.exedescription pid process Token: SeDebugPrivilege 2332 FurkUltra.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
FurkUltra.exedescription pid process target process PID 2332 wrote to memory of 2904 2332 FurkUltra.exe WerFault.exe PID 2332 wrote to memory of 2904 2332 FurkUltra.exe WerFault.exe PID 2332 wrote to memory of 2904 2332 FurkUltra.exe WerFault.exe PID 2332 wrote to memory of 2904 2332 FurkUltra.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\FurkUltra.exe"C:\Users\Admin\AppData\Local\Temp\Furk-Ultra-main\FurkUltra.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 12922⤵
- Program crash
PID:2904
-