Analysis

  • max time kernel
    100s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2023, 11:43

General

  • Target

    Fortnite_hack.rar

  • Size

    17.7MB

  • MD5

    bd5aa42d602ca678d0f63bb9303ebcf3

  • SHA1

    6ea0969cafce00f9971779e2e3a980a7aca4aaeb

  • SHA256

    de9071d310ee3a0850be73639e2af19dff7d5c2d105bb057298f55e8f63fb756

  • SHA512

    c7c8c0dda3138f4e7eda1923d3121da58cefadf26cc03eebea159e1dc23d4b88e482295b741e805b0d01b992fd19300a58a9db426a760b89ffa91465cab4d223

  • SSDEEP

    393216:KVkDvGyn/quK2fxqReUJmEkCxKGTz8HX0tOPXK37OirlaH3xGWgL:lDOyn/qujpqBrk3QyYTYHw5L

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Fortnite_hack.rar
    1⤵
    • Modifies registry class
    PID:704
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Fortnite_hack.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Users\Admin\AppData\Local\Temp\7zO471946C6\intаll.exe
        "C:\Users\Admin\AppData\Local\Temp\7zO471946C6\intаll.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3424

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

          Filesize

          28KB

          MD5

          3c29d93adab64dc77ab4e36f7932e9ee

          SHA1

          cf1e2320c5fb7291b85658aa4cffcfd987cbae15

          SHA256

          dbd900c54d4096d57db152911ec023409c3084e3e6a717db58754cdd0aebe526

          SHA512

          ddd66c9fd2f563392808ff01c93403b0a44dcba3c288e2144801bac6e2874755237308b074e33bf318f0281652836d03c70db41007ad621cc3371e80b2dc3e0c

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

          Filesize

          28KB

          MD5

          d83297428fdd7ddcecb8b0e2d5f05ec9

          SHA1

          215e5c1aa2120e2ac692b1bd22de680fb4537313

          SHA256

          31c11d669b8c2e7c565eb6e212d1825d2806c2ceb689fb0370bf84fa5a9d5e7b

          SHA512

          629e9bd5b066844514a2242683eea7ff076512a57bc1cf0d8e9cfe18ea027378c19f7926abebe4c4b410ec62ff7489c6e29882ac77cec45e140484795efe2f9d

        • C:\Users\Admin\AppData\Local\Temp\7zO471946C6\intаll.exe

          Filesize

          452.8MB

          MD5

          dec35e923503c77d3150e70bde59c139

          SHA1

          a141e37d1aeab7114ff05910a1312d2be1aafe51

          SHA256

          c06c4298f0ebf037d99f3d54814de05196b3bb7d809d5264c6f265c7db144580

          SHA512

          8390155640feb6d84a3566983588057078dc7ad4394bc629953187610bef072bd361b27c073bc19ae4adb8bb09a7fc9b0f2ff1a5055c691213bdc1ea263ebf11

        • C:\Users\Admin\AppData\Local\Temp\7zO471946C6\intаll.exe

          Filesize

          292.2MB

          MD5

          0ac43e21a0c9065cddbdaca7314c5a24

          SHA1

          c90a364a1b66b559eca60529958828b9c9a89e8d

          SHA256

          31599ecc9711454cbd0f834d19efcf8c1c5352fc24948e57d8d15a6df72a0800

          SHA512

          417cc002d39411e0da5810fe22174cb7632e533689ccfb4db25e4f57494a26a7509dc324288808bf5986c8e61ec92e7fab8250a89285790b32bdca7f2532cc21

        • C:\Users\Admin\AppData\Local\Temp\7zO471946C6\intаll.exe

          Filesize

          344.3MB

          MD5

          39ea6de1fc1acd08c79f603a70a495f5

          SHA1

          a027517de4b9bd8a4c8f4ba22d0632b04b9b8469

          SHA256

          b698a70442ccc64dde5a2c2d10e4c6ee13f1490626e8e3902f58ed8efaed5ca3

          SHA512

          c8bb918aeb2f878b72c083718b0b9bd2bb55aece7b89a774cbc03ab80d39894ce60fd02185e97861127bd4dcd6d6bb6028ea0a3999e7792049a1cef840ee3bae

        • memory/3424-156-0x0000000000AA0000-0x0000000001524000-memory.dmp

          Filesize

          10.5MB

        • memory/3424-157-0x0000000006200000-0x0000000006210000-memory.dmp

          Filesize

          64KB