Analysis
-
max time kernel
37s -
max time network
39s -
platform
windows10-1703_x64 -
resource
win10-20220718-en -
resource tags
arch:x64arch:x86image:win10-20220718-enlocale:en-usos:windows10-1703-x64system -
submitted
04-08-2022 08:02
Behavioral task
behavioral1
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win10-20220718-en
Behavioral task
behavioral3
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win10v2004-20220721-en
Behavioral task
behavioral4
Sample
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
Resource
win11-20220223-en
General
-
Target
FortniteChecker.v.2.0.0/ForniteChecker.v2.0.0.exe
-
Size
1.8MB
-
MD5
6f217b137ff59fd3b821a340c0a35a4e
-
SHA1
1e8dc83be90e3b1c369e393032cbece7d65083b3
-
SHA256
9e6ebe40697a1fa68ca9208dcbe4f8349f52d288b4ced8bd2b07eec6367e025d
-
SHA512
bd5bde451038ba283cc8b0f459f0ef2a89ba0fcee3d6fc1cd246080a84932f1008e681cb608ee40ddc3fb35d37685c3dabf67f8a6686e8650adfba81e431e1dc
Malware Config
Signatures
-
ElysiumStealer
ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.
-
ElysiumStealer Support DLL 1 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll elysiumstealer_dll -
ElysiumStealer payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1884-148-0x0000000000D10000-0x0000000000EE2000-memory.dmp elysiumstealer behavioral2/memory/1884-155-0x0000000005620000-0x000000000562C000-memory.dmp elysiumstealer -
Processes:
ForniteChecker.v2.0.0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ForniteChecker.v2.0.0.exe -
Loads dropped DLL 1 IoCs
Processes:
ForniteChecker.v2.0.0.exepid process 1884 ForniteChecker.v2.0.0.exe -
Processes:
ForniteChecker.v2.0.0.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ForniteChecker.v2.0.0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ForniteChecker.v2.0.0.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 1 ip-api.com -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
ForniteChecker.v2.0.0.exepid process 1884 ForniteChecker.v2.0.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ForniteChecker.v2.0.0.exedescription pid process Token: SeDebugPrivilege 1884 ForniteChecker.v2.0.0.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
ForniteChecker.v2.0.0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ForniteChecker.v2.0.0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FortniteChecker.v.2.0.0\ForniteChecker.v2.0.0.exe"C:\Users\Admin\AppData\Local\Temp\FortniteChecker.v.2.0.0\ForniteChecker.v2.0.0.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dllFilesize
40KB
MD594173de2e35aa8d621fc1c4f54b2a082
SHA1fbb2266ee47f88462560f0370edb329554cd5869
SHA2567e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f
SHA512cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798
-
memory/1884-114-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-115-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-116-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-117-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-118-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-119-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-120-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-121-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-122-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-123-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-124-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-125-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-126-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-127-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-128-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-129-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-130-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-131-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-132-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-133-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-134-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-135-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-137-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-136-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-138-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-139-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-140-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-141-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-142-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-143-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-144-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-145-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-146-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-147-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-148-0x0000000000D10000-0x0000000000EE2000-memory.dmpFilesize
1.8MB
-
memory/1884-149-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-150-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-151-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-152-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-153-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-154-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-155-0x0000000005620000-0x000000000562C000-memory.dmpFilesize
48KB
-
memory/1884-156-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-158-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-159-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-160-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-161-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-162-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-163-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-164-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-165-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-166-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-167-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-168-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-169-0x0000000005850000-0x00000000058CA000-memory.dmpFilesize
488KB
-
memory/1884-170-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-171-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-172-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-173-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-174-0x0000000005970000-0x00000000059D6000-memory.dmpFilesize
408KB
-
memory/1884-175-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-176-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-177-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-178-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-179-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-180-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-181-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB
-
memory/1884-182-0x0000000077B20000-0x0000000077CAE000-memory.dmpFilesize
1.6MB