Analysis
-
max time kernel
323s -
max time network
325s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
02-04-2023 15:29
Static task
static1
Behavioral task
behavioral1
Sample
Blueberry_Fortnite_Free_External.exe
Resource
win10-20230220-en
windows10-1703-x64
8 signatures
600 seconds
General
-
Target
Blueberry_Fortnite_Free_External.exe
-
Size
6.3MB
-
MD5
1c3615f92ab26802bfcf1575485fd4fe
-
SHA1
5110da60117e2a2d0f2d3971856246f3c659d0cf
-
SHA256
2437990d15f126e69a56fce1259c4ff90433a991d3f4a9464f2598bb5cefe3cf
-
SHA512
9631be2c8da8f7d110c00463182bc0a46e8dc266e52c6a61eb7d20a72ab9cee522912a77bcf642e8ccf9112917da441e02eda6900ef8dd895da6b123909214be
-
SSDEEP
196608:kHnUZL7oNz1+hjWA1xkYJqKz3wnjLwPMQ:kHhwfxkYYbjLMM
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\sjbRAqNohCXeCaarXNye\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\sjbRAqNohCXeCaarXNye" Blueberry_Fortnite_Free_External.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\LfLrucYDBjiolCY\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\LfLrucYDBjiolCY" Blueberry_Fortnite_Free_External.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\XZqIYOiVfmsyxbKCRoocuGjwdXxEA\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\XZqIYOiVfmsyxbKCRoocuGjwdXxEA" Blueberry_Fortnite_Free_External.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1792 Blueberry_Fortnite_Free_External.exe 1792 Blueberry_Fortnite_Free_External.exe 372 Blueberry_Fortnite_Free_External.exe 372 Blueberry_Fortnite_Free_External.exe 4868 Blueberry_Fortnite_Free_External.exe 4868 Blueberry_Fortnite_Free_External.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1792 Blueberry_Fortnite_Free_External.exe 1792 Blueberry_Fortnite_Free_External.exe 372 Blueberry_Fortnite_Free_External.exe 372 Blueberry_Fortnite_Free_External.exe 4868 Blueberry_Fortnite_Free_External.exe 4868 Blueberry_Fortnite_Free_External.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 1792 Blueberry_Fortnite_Free_External.exe 372 Blueberry_Fortnite_Free_External.exe 4868 Blueberry_Fortnite_Free_External.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeLoadDriverPrivilege 1792 Blueberry_Fortnite_Free_External.exe Token: SeLoadDriverPrivilege 372 Blueberry_Fortnite_Free_External.exe Token: SeLoadDriverPrivilege 4868 Blueberry_Fortnite_Free_External.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 372 Blueberry_Fortnite_Free_External.exe 4868 Blueberry_Fortnite_Free_External.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe 4156 OpenWith.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2588 1792 Blueberry_Fortnite_Free_External.exe 67 PID 1792 wrote to memory of 2588 1792 Blueberry_Fortnite_Free_External.exe 67 PID 372 wrote to memory of 4844 372 Blueberry_Fortnite_Free_External.exe 78 PID 372 wrote to memory of 4844 372 Blueberry_Fortnite_Free_External.exe 78 PID 4868 wrote to memory of 4896 4868 Blueberry_Fortnite_Free_External.exe 81 PID 4868 wrote to memory of 4896 4868 Blueberry_Fortnite_Free_External.exe 81 PID 4156 wrote to memory of 4176 4156 OpenWith.exe 83 PID 4156 wrote to memory of 4176 4156 OpenWith.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Blueberry_Fortnite_Free_External.exe"C:\Users\Admin\AppData\Local\Temp\Blueberry_Fortnite_Free_External.exe"1⤵
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 12⤵PID:2588
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\Blueberry_Fortnite_Free_External.exe"C:\Users\Admin\AppData\Local\Temp\Blueberry_Fortnite_Free_External.exe"1⤵
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 12⤵PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\Blueberry_Fortnite_Free_External.exe"C:\Users\Admin\AppData\Local\Temp\Blueberry_Fortnite_Free_External.exe"1⤵
- Sets service image path in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 12⤵PID:4896
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\XZqIYOiVfmsyxbKCRoocuGjwdXxEA2⤵PID:4176
-