Analysis
-
max time kernel
60s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
20-05-2023 16:24
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite_wBggPATCXBwvM5a.rar
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Fortnite_wBggPATCXBwvM5a.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Best Free Cheats Site.url
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
Best Free Cheats Site.url
Resource
win10v2004-20230221-en
General
-
Target
Fortnite_wBggPATCXBwvM5a.rar
-
Size
4.5MB
-
MD5
5ce4eb0196574f65e38719ddcf075794
-
SHA1
3fc623eed273f89bf6162a78087187142d7ce048
-
SHA256
6439b7404a261654f6086a725426d1663eb972a4b25eae42da7fafcf94d45310
-
SHA512
68ee66d551bafc79ce55815560b97e20211d015411da3728bef5959b78162396b6951453ecc8bf27198b0c23eadbb96ed4262cdbf3e8bd188d03e7ed44d311b7
-
SSDEEP
98304:l43ukLHc5Sj9O2JQgnuuP1sG5lJfTRP0XsqB3wo5FT3dLKgbC:l43ukTn51SKVTqX/55FT32
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1720 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1720 vlc.exe -
Suspicious use of FindShellTrayWindow 9 IoCs
pid Process 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe 1720 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1720 vlc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 816 wrote to memory of 268 816 cmd.exe 28 PID 816 wrote to memory of 268 816 cmd.exe 28 PID 816 wrote to memory of 268 816 cmd.exe 28 PID 268 wrote to memory of 1720 268 rundll32.exe 29 PID 268 wrote to memory of 1720 268 rundll32.exe 29 PID 268 wrote to memory of 1720 268 rundll32.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Fortnite_wBggPATCXBwvM5a.rar1⤵
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Fortnite_wBggPATCXBwvM5a.rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Fortnite_wBggPATCXBwvM5a.rar"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1720
-
-