Resubmissions

14-01-2025 06:18

250114-g2qvnsyrdy 7

14-01-2025 06:15

250114-gzxkfayqhx 10

14-01-2025 06:10

250114-gxcr9a1mdl 10

14-01-2025 06:09

250114-gwqbysyphy 10

03-07-2022 12:33

220703-pq62hsfcdn 8

Analysis

  • max time kernel
    841s
  • max time network
    843s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 06:18

General

  • Target

    Ultima_Multihack.exe

  • Size

    6.4MB

  • MD5

    a2f01be6e514a6cd3424f9762f2c5b02

  • SHA1

    1553dd3e3556f2c82ab312659d5184952d0b9a4e

  • SHA256

    b3847c94d840dd53c3ba7248734424f06715deacf6dd6ebb727c2f1a7de4c945

  • SHA512

    fa9dd15980bd80bcd250a1ac990281824f822635b8d3bb7d1d1a78958c8ec084e775735c3c14c09337076c3f4fe1185cd06cfb4cd989fcc0be78bd99c577e616

  • SSDEEP

    196608:j6bFse+vAqC6Fe656nqpB9zDXq9frWSCuHynw:ebFsXIqje656qpB9zDa9DWSCwynw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ultima_Multihack.exe
    C:\Users\Admin\AppData\Local\Temp\Ultima_Multihack.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\6816.tmp\6817.tmp\6818.bat C:\Users\Admin\AppData\Local\Temp\Ultima_Multihack.exe cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2788
      • C:\Users\Admin\AppData\Local\Temp\6816.tmp\ultima.exe
        ultima.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6816.tmp\6817.tmp\6818.bat

    Filesize

    48B

    MD5

    a703e72757cc5721f6604f29501d1fcb

    SHA1

    f296318971c483966d39548c7b26072c58b1cb63

    SHA256

    b7a7e70f4a51a62b70a08919924409d102b3d797189cca93295a24caa7fa4508

    SHA512

    f6c68271b63dedda9d7269d5a055b61ef68c5d9f6022e99cb1f08c1737085276c8ad63a7f79041b0076b960144cded460175b9ba09465e6641f00fff455b7764

  • C:\Users\Admin\AppData\Local\Temp\6816.tmp\Bunifu_UI_v1.5.3.dll

    Filesize

    236KB

    MD5

    2ecb51ab00c5f340380ecf849291dbcf

    SHA1

    1a4dffbce2a4ce65495ed79eab42a4da3b660931

    SHA256

    f1b3e0f2750a9103e46a6a4a34f1cf9d17779725f98042cc2475ec66484801cf

    SHA512

    e241a48eafcaf99187035f0870d24d74ae97fe84aaadd2591cceea9f64b8223d77cfb17a038a58eadd3b822c5201a6f7494f26eea6f77d95f77f6c668d088e6b

  • C:\Users\Admin\AppData\Local\Temp\6816.tmp\ultima.exe

    Filesize

    5.8MB

    MD5

    c67ec628289d5c29f6d3b925a8c0f4f9

    SHA1

    cf7710c70bdf807130f86241e1e6829594345fb7

    SHA256

    291c70fb8033924f6767371e3d5a53c896c57abc914b5729ef0a082cb63903fb

    SHA512

    c6ef4e80f7a84f8c675576c18e753273eb5b345843c1c6d571137adbcd66214e2284e7e3d730fa8a5c0314edbac9ab70ab9b7c0eaa1668fe22e36fde9121a97f

  • memory/2816-12-0x000000007403E000-0x000000007403F000-memory.dmp

    Filesize

    4KB

  • memory/2816-13-0x00000000002B0000-0x0000000000884000-memory.dmp

    Filesize

    5.8MB

  • memory/2816-17-0x00000000024A0000-0x00000000024E2000-memory.dmp

    Filesize

    264KB

  • memory/2816-18-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2816-19-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2816-20-0x000000007403E000-0x000000007403F000-memory.dmp

    Filesize

    4KB

  • memory/2816-21-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB