Analysis

  • max time kernel
    22s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2023, 16:56

General

  • Target

    FortniteLauncher.exe

  • Size

    34.4MB

  • MD5

    8288fa56718ae7ffb3c6c3e7be7eb9e4

  • SHA1

    a86827d83a3800928f6b4a22b8b853f9fc5275e7

  • SHA256

    866efa2bd9932ad477e96c3829c1b1d202bddf9f536e23825a5bcb2bc2d0107d

  • SHA512

    26fe82ff95c81ee7a645679d597b529b6bc3658f68bc39f36ec4c3a2c0f461199093a97006481345eef9921047becebb918aec81932d7c42629bb2a655d3c16f

  • SSDEEP

    786432:bu55/xE6TpX5ovBt/F9zX04rMdlRtTJouvuD4v3K+tvF4+aXQgHiln:a5tvTTovTTL044dlf9ounv3JttfaXQU

Score
8/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Program crash 1 IoCs
  • Modifies registry class 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortniteLauncher.exe
    "C:\Users\Admin\AppData\Local\Temp\FortniteLauncher.exe"
    1⤵
    • Registers COM server for autorun
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4944
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4944 -s 2092
      2⤵
      • Program crash
      PID:4756
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 184 -p 4944 -ip 4944
    1⤵
      PID:2248

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/4944-132-0x00007FFF6F780000-0x00007FFF70241000-memory.dmp

            Filesize

            10.8MB

          • memory/4944-133-0x00000257BC780000-0x00000257BE9E6000-memory.dmp

            Filesize

            34.4MB

          • memory/4944-134-0x00000257BEE70000-0x00000257BEE7E000-memory.dmp

            Filesize

            56KB

          • memory/4944-135-0x00000257DDAC0000-0x00000257DDAC8000-memory.dmp

            Filesize

            32KB

          • memory/4944-136-0x00000257DFA30000-0x00000257DFA68000-memory.dmp

            Filesize

            224KB

          • memory/4944-137-0x00000257DF9F0000-0x00000257DF9FE000-memory.dmp

            Filesize

            56KB

          • memory/4944-138-0x00007FFF6F780000-0x00007FFF70241000-memory.dmp

            Filesize

            10.8MB

          • memory/4944-139-0x00000257E0BB0000-0x00000257E0BD8000-memory.dmp

            Filesize

            160KB

          • memory/4944-140-0x00000257DFB60000-0x00000257DFB6A000-memory.dmp

            Filesize

            40KB

          • memory/4944-141-0x00000257DFB70000-0x00000257DFB78000-memory.dmp

            Filesize

            32KB

          • memory/4944-142-0x00000257E4BC0000-0x00000257E4BE6000-memory.dmp

            Filesize

            152KB

          • memory/4944-143-0x00007FFF6F780000-0x00007FFF70241000-memory.dmp

            Filesize

            10.8MB