Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
04-08-2022 08:02
Behavioral task
behavioral1
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win10-20220718-en
Behavioral task
behavioral3
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral4
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win11-20220223-en
General
-
Target
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
-
Size
1.8MB
-
MD5
6f217b137ff59fd3b821a340c0a35a4e
-
SHA1
1e8dc83be90e3b1c369e393032cbece7d65083b3
-
SHA256
9e6ebe40697a1fa68ca9208dcbe4f8349f52d288b4ced8bd2b07eec6367e025d
-
SHA512
bd5bde451038ba283cc8b0f459f0ef2a89ba0fcee3d6fc1cd246080a84932f1008e681cb608ee40ddc3fb35d37685c3dabf67f8a6686e8650adfba81e431e1dc
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
resource yara_rule behavioral2/files/0x000c00000001ac07-157.dat elysiumstealer_dll -
ElysiumStealer payload 2 IoCs
resource yara_rule behavioral2/memory/1884-148-0x0000000000D10000-0x0000000000EE2000-memory.dmp elysiumstealer behavioral2/memory/1884-155-0x0000000005620000-0x000000000562C000-memory.dmp elysiumstealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ForniteChecker.v2.0.0.exe -
Loads dropped DLL 1 IoCs
pid Process 1884 ForniteChecker.v2.0.0.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ForniteChecker.v2.0.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ForniteChecker.v2.0.0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1884 ForniteChecker.v2.0.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1884 ForniteChecker.v2.0.0.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ForniteChecker.v2.0.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FortniteChecker.v.2.0.0\ForniteChecker.v2.0.0.exe"C:\Users\Admin\AppData\Local\Temp\FortniteChecker.v.2.0.0\ForniteChecker.v2.0.0.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:1884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798