Analysis
-
max time kernel
77s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2022 21:52
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Fortnite.exe
Resource
win10v2004-20221111-en
General
-
Target
Fortnite.exe
-
Size
88KB
-
MD5
03c214ed5ed9cf06d1268c7ea3d5c5e0
-
SHA1
3d9a14b6868dc6310d404f359125cf9da58014ba
-
SHA256
d17658c7bf8c23219b52fa871a7899c9e32039977a2aa69f82d5ad393a45d2f2
-
SHA512
6bcad960064f69096527dc3fb575fe09e594defeedfa11cdd981ffbab7e5c6801eb84d6bfd334f411388eda4f7b0f575b633f2c8f50d290e8a78bfa9953b9f69
-
SSDEEP
1536:zj7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfwwzOh:z/FfHgTWmCRkGbKGLeNTBfwn
Malware Config
Signatures
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\wallpaper.jpg" reg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2840 4644 Fortnite.exe 82 PID 4644 wrote to memory of 2840 4644 Fortnite.exe 82 PID 2840 wrote to memory of 2040 2840 cmd.exe 83 PID 2840 wrote to memory of 2040 2840 cmd.exe 83 PID 2840 wrote to memory of 3476 2840 cmd.exe 84 PID 2840 wrote to memory of 3476 2840 cmd.exe 84 PID 2840 wrote to memory of 1392 2840 cmd.exe 85 PID 2840 wrote to memory of 1392 2840 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\81C7.tmp\81C8.tmp\81C9.bat C:\Users\Admin\AppData\Local\Temp\Fortnite.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\curl.execurl -o "C:\Users\Admin\Pictures\wallpaper.jpg" "https://www.ytflash.com/wp-content/uploads/2016/05/3.jpg"3⤵PID:2040
-
-
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\Pictures\wallpaper.jpg" /f3⤵
- Sets desktop wallpaper using registry
PID:3476
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters3⤵PID:1392
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD5669ca360d34eb867b494b7e448047071
SHA1c26bf5ee846ca5a8ea34ae7e671ffd6c2023ff7d
SHA2561dffee16a637ed2028d4a4e45b528a26bc18cf161639eb7060313e405b84a33c
SHA51253545e4858cd8bd1bd7ed91edd3fed70c377a164f4a66abe311f918b1e462e4ae6ec8aa43818f4f7da768d5b0e4107aa4790dc1f0f92de04141b6bff7d9aca5e