Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2022 04:26

General

  • Target

    Fortnite Internal Esp AIm Clean Full_nls..scr

  • Size

    2.6MB

  • MD5

    5361a2f1d174599ebc5b6cc31daf86f2

  • SHA1

    ade74d0abac77203629b81513a739f11b39a52ef

  • SHA256

    55af1ee79176f2503dc6cee5464344e6bbcaa4e37b4ae7217922c8e56ec395cf

  • SHA512

    96381c583b975e4c2cd7ec70bd955936c48a9737036234241e37e73baf81c96cb28ab28d2fe3c53ed1e8ce0be641fba653d7e6877770cb8f60fb32f2c7b703b4

  • SSDEEP

    49152:j8ASxr7FEi5LbunhHpj5G3FVhIdag5SNHeGJWrz:jTSt7FEGnCdpj5G3FVq18gGJ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\Fortnite Internal Esp AIm Clean Full_nls..scr
      "C:\Users\Admin\AppData\Local\Temp\Fortnite Internal Esp AIm Clean Full_nls..scr" /S
      2⤵
      • Modifies WinLogon for persistence
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Gngwnbcqyucvbwsgwyojoproject.sln
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
          "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Gngwnbcqyucvbwsgwyojoproject.sln"
          4⤵
          • Suspicious use of SetWindowsHookEx
          PID:480
    • C:\Users\Admin\AppData\Local\Temp\tmp5024.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp5024.tmp.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Roaming\BLACKNET.EXE
        "C:\Users\Admin\AppData\Roaming\BLACKNET.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1620
      • C:\Users\Admin\AppData\Roaming\SERVICEEDEFENDER.EXE
        "C:\Users\Admin\AppData\Roaming\SERVICEEDEFENDER.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2012
      • C:\Users\Admin\AppData\Roaming\WINDOWSDEFENDRSMARTSCREEN.EXE
        "C:\Users\Admin\AppData\Roaming\WINDOWSDEFENDRSMARTSCREEN.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
      • C:\Users\Admin\AppData\Roaming\WINDOWSSECUTIYHALTHYSERVICE.EXE
        "C:\Users\Admin\AppData\Roaming\WINDOWSSECUTIYHALTHYSERVICE.EXE"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:940

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Gngwnbcqyucvbwsgwyojoproject.sln
    Filesize

    1KB

    MD5

    aeee58518da7889951bf8aae1696ce79

    SHA1

    a7fe2d1ca76bbdf519a724baf714cb53341617ac

    SHA256

    e85a8310a266e15e043261400ef7caef5f19d5fb60fff0c359db292d172e2ca7

    SHA512

    f54e34e805225b7d56e1a9a48b5f41939c4a525dfdd9d8f718161794f66bcfb66459689738615be8eccd54998ec173c24b565c8252b09ca0e23c62117f18b77b

  • C:\Users\Admin\AppData\Local\Temp\tmp5024.tmp.exe
    Filesize

    928KB

    MD5

    a1cb188468d9e8699e98a07eec4e1a86

    SHA1

    ed41e241d733496ad0edcfe3c2270c55f55884ca

    SHA256

    dcb96304f914dad4a7766c66c5847fa13b872e6188e426ae59038c6e11e3c594

    SHA512

    8cf987d14158f78c69952a42dbbcc2861174331d034841a6d78e42926b470fa0e5f9a31740595b98b1c4e54028f6a9680d8790424f893918388d771c87438ce6

  • C:\Users\Admin\AppData\Roaming\BLACKNET.EXE
    Filesize

    132KB

    MD5

    5361492a445395b3abdd3a8d430090dd

    SHA1

    a0f92e46bfcdcdda574130abd6f57a9e6b2a90f0

    SHA256

    1eebad9bce22f20abfb8b61eeeaf8ad1166fd23d8b350af22b06392c53bc2802

    SHA512

    92bf6b2fa52a208387bc5c5970d26208b91668e95196708bf393ff1a781fc4174cbbcf8942ce9fc4df2d6fdbe751a46517daa2c28081b4862434304deebda305

  • C:\Users\Admin\AppData\Roaming\BLACKNET.EXE
    Filesize

    132KB

    MD5

    5361492a445395b3abdd3a8d430090dd

    SHA1

    a0f92e46bfcdcdda574130abd6f57a9e6b2a90f0

    SHA256

    1eebad9bce22f20abfb8b61eeeaf8ad1166fd23d8b350af22b06392c53bc2802

    SHA512

    92bf6b2fa52a208387bc5c5970d26208b91668e95196708bf393ff1a781fc4174cbbcf8942ce9fc4df2d6fdbe751a46517daa2c28081b4862434304deebda305

  • C:\Users\Admin\AppData\Roaming\SERVICEEDEFENDER.EXE
    Filesize

    346KB

    MD5

    c21905b87778932cb51b4715d00e7e7e

    SHA1

    642c4371d36e27cb165a4eb0b7037d4eebdf4dd5

    SHA256

    4f120c8ebabebcb9de147e7e0d087b38d86c67aed5889b72a417afdba8008551

    SHA512

    213e611b240041b2e1eaa91d5d28cec7d309e06fc528e37cacc64b1014128f106e906bb1ccbdd22d6df59de938af5c76542e7f3f05534cb0662dff57adbedde3

  • C:\Users\Admin\AppData\Roaming\SERVICEEDEFENDER.EXE
    Filesize

    346KB

    MD5

    c21905b87778932cb51b4715d00e7e7e

    SHA1

    642c4371d36e27cb165a4eb0b7037d4eebdf4dd5

    SHA256

    4f120c8ebabebcb9de147e7e0d087b38d86c67aed5889b72a417afdba8008551

    SHA512

    213e611b240041b2e1eaa91d5d28cec7d309e06fc528e37cacc64b1014128f106e906bb1ccbdd22d6df59de938af5c76542e7f3f05534cb0662dff57adbedde3

  • C:\Users\Admin\AppData\Roaming\WINDOWSDEFENDRSMARTSCREEN.EXE
    Filesize

    132KB

    MD5

    17fb18573b1dc1054c54f75d03f6a654

    SHA1

    35215aab38d1c308f2ed7c42b0d363d083e2b23b

    SHA256

    d131775334ba49896d6566cc77063010bb6f2221ae4816e6dab133bad691f2f1

    SHA512

    b6e4ce10eb1342bcbddbb9801de1a7b78c6e385005914adbaad8580d4ceeb125202528d22b4c13ec3e7976f5a471ce7c763aea19eb980282627d0383ba712b3f

  • C:\Users\Admin\AppData\Roaming\WINDOWSDEFENDRSMARTSCREEN.EXE
    Filesize

    132KB

    MD5

    17fb18573b1dc1054c54f75d03f6a654

    SHA1

    35215aab38d1c308f2ed7c42b0d363d083e2b23b

    SHA256

    d131775334ba49896d6566cc77063010bb6f2221ae4816e6dab133bad691f2f1

    SHA512

    b6e4ce10eb1342bcbddbb9801de1a7b78c6e385005914adbaad8580d4ceeb125202528d22b4c13ec3e7976f5a471ce7c763aea19eb980282627d0383ba712b3f

  • C:\Users\Admin\AppData\Roaming\WINDOWSSECUTIYHALTHYSERVICE.EXE
    Filesize

    132KB

    MD5

    e8a55a613d23e48cec6bcffe953f422e

    SHA1

    3140be37c0cfc5d128ad7558ce88cb520ad4ee20

    SHA256

    bad7ea46205f801d461cd295f246b7ab6c8a0dbd6d93c0021f9e04b0c8f49f97

    SHA512

    dd6e34824d0811c3f7409bf8882b033bba270fc0d7a4d783d21359ac0043975700e0d1f6a08f33e41d8283eb1ba65881a29e67eaa3ea11ccc4d32eabaca28daf

  • C:\Users\Admin\AppData\Roaming\WINDOWSSECUTIYHALTHYSERVICE.EXE
    Filesize

    132KB

    MD5

    e8a55a613d23e48cec6bcffe953f422e

    SHA1

    3140be37c0cfc5d128ad7558ce88cb520ad4ee20

    SHA256

    bad7ea46205f801d461cd295f246b7ab6c8a0dbd6d93c0021f9e04b0c8f49f97

    SHA512

    dd6e34824d0811c3f7409bf8882b033bba270fc0d7a4d783d21359ac0043975700e0d1f6a08f33e41d8283eb1ba65881a29e67eaa3ea11ccc4d32eabaca28daf

  • \Users\Admin\AppData\Roaming\BLACKNET.EXE
    Filesize

    132KB

    MD5

    5361492a445395b3abdd3a8d430090dd

    SHA1

    a0f92e46bfcdcdda574130abd6f57a9e6b2a90f0

    SHA256

    1eebad9bce22f20abfb8b61eeeaf8ad1166fd23d8b350af22b06392c53bc2802

    SHA512

    92bf6b2fa52a208387bc5c5970d26208b91668e95196708bf393ff1a781fc4174cbbcf8942ce9fc4df2d6fdbe751a46517daa2c28081b4862434304deebda305

  • \Users\Admin\AppData\Roaming\SERVICEEDEFENDER.EXE
    Filesize

    346KB

    MD5

    c21905b87778932cb51b4715d00e7e7e

    SHA1

    642c4371d36e27cb165a4eb0b7037d4eebdf4dd5

    SHA256

    4f120c8ebabebcb9de147e7e0d087b38d86c67aed5889b72a417afdba8008551

    SHA512

    213e611b240041b2e1eaa91d5d28cec7d309e06fc528e37cacc64b1014128f106e906bb1ccbdd22d6df59de938af5c76542e7f3f05534cb0662dff57adbedde3

  • \Users\Admin\AppData\Roaming\WINDOWSDEFENDRSMARTSCREEN.EXE
    Filesize

    132KB

    MD5

    17fb18573b1dc1054c54f75d03f6a654

    SHA1

    35215aab38d1c308f2ed7c42b0d363d083e2b23b

    SHA256

    d131775334ba49896d6566cc77063010bb6f2221ae4816e6dab133bad691f2f1

    SHA512

    b6e4ce10eb1342bcbddbb9801de1a7b78c6e385005914adbaad8580d4ceeb125202528d22b4c13ec3e7976f5a471ce7c763aea19eb980282627d0383ba712b3f

  • \Users\Admin\AppData\Roaming\WINDOWSSECUTIYHALTHYSERVICE.EXE
    Filesize

    132KB

    MD5

    e8a55a613d23e48cec6bcffe953f422e

    SHA1

    3140be37c0cfc5d128ad7558ce88cb520ad4ee20

    SHA256

    bad7ea46205f801d461cd295f246b7ab6c8a0dbd6d93c0021f9e04b0c8f49f97

    SHA512

    dd6e34824d0811c3f7409bf8882b033bba270fc0d7a4d783d21359ac0043975700e0d1f6a08f33e41d8283eb1ba65881a29e67eaa3ea11ccc4d32eabaca28daf

  • memory/456-66-0x000000001BB27000-0x000000001BB46000-memory.dmp
    Filesize

    124KB

  • memory/456-67-0x0000000077920000-0x0000000077AC9000-memory.dmp
    Filesize

    1.7MB

  • memory/456-64-0x000000001BB27000-0x000000001BB46000-memory.dmp
    Filesize

    124KB

  • memory/456-63-0x0000000077920000-0x0000000077AC9000-memory.dmp
    Filesize

    1.7MB

  • memory/456-62-0x0000000077920000-0x0000000077AC9000-memory.dmp
    Filesize

    1.7MB

  • memory/456-58-0x000000001BB27000-0x000000001BB46000-memory.dmp
    Filesize

    124KB

  • memory/456-54-0x00000000000E0000-0x0000000000380000-memory.dmp
    Filesize

    2.6MB

  • memory/456-55-0x000000001B340000-0x000000001B5A4000-memory.dmp
    Filesize

    2.4MB

  • memory/480-60-0x0000000075D31000-0x0000000075D33000-memory.dmp
    Filesize

    8KB

  • memory/480-59-0x0000000000000000-mapping.dmp
  • memory/940-84-0x0000000000000000-mapping.dmp
  • memory/940-90-0x0000000000EB0000-0x0000000000ED6000-memory.dmp
    Filesize

    152KB

  • memory/1056-68-0x0000000000000000-mapping.dmp
  • memory/1144-56-0x0000000000000000-mapping.dmp
  • memory/1144-57-0x000007FEFC1A1000-0x000007FEFC1A3000-memory.dmp
    Filesize

    8KB

  • memory/1172-80-0x0000000000000000-mapping.dmp
  • memory/1172-89-0x0000000000E40000-0x0000000000E66000-memory.dmp
    Filesize

    152KB

  • memory/1400-65-0x0000000006090000-0x00000000060EC000-memory.dmp
    Filesize

    368KB

  • memory/1620-72-0x0000000000000000-mapping.dmp
  • memory/1620-87-0x0000000000A00000-0x0000000000A26000-memory.dmp
    Filesize

    152KB

  • memory/2012-76-0x0000000000000000-mapping.dmp
  • memory/2012-88-0x0000000000070000-0x00000000000CC000-memory.dmp
    Filesize

    368KB