Resubmissions

15-07-2023 18:50

230715-xgzj3sbf24 7

15-07-2023 18:48

230715-xfvjqsce3s 7

Analysis

  • max time kernel
    47s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2023 18:50

General

  • Target

    FortniteCheats.exe

  • Size

    7.0MB

  • MD5

    a58c4e1c729d5216e8325c13e6760a4e

  • SHA1

    79ce34a7bfa4bfa2ac097ec51961cee62fdcb5d2

  • SHA256

    e8521099391529acd7629b3eef95243b9a748bd4e20c3310a10ccce786408a12

  • SHA512

    43efebf3b8a23dee7bbbd8751021deb2c14a6d4cb0292174497b91e9d88633fbbf295315547340857d285fbe3fe3a29165e8aa9d744f5ca9d5caa04398818d4e

  • SSDEEP

    196608:s2QsGbT/9bvLz3S1bA329Oq3tCfnCHRIXWHPpyN:ZGbTlj3S1bO29Oq3tCPSZH0

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 50 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortniteCheats.exe
    "C:\Users\Admin\AppData\Local\Temp\FortniteCheats.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Users\Admin\AppData\Local\Temp\FortniteCheats.exe
      "C:\Users\Admin\AppData\Local\Temp\FortniteCheats.exe"
      2⤵
      • Loads dropped DLL
      PID:2944
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7009758,0x7fef7009768,0x7fef7009778
      2⤵
        PID:2900
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:2
        2⤵
          PID:964
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
          2⤵
            PID:1308
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1600 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
            2⤵
              PID:1488
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2280 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
              2⤵
                PID:2200
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2316 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                2⤵
                  PID:2196
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1452 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:2
                  2⤵
                    PID:1336
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1280 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                    2⤵
                      PID:812
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3444 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                      2⤵
                        PID:2096
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3548 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                        2⤵
                          PID:1560
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4012 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                          2⤵
                            PID:1368
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4232 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                            2⤵
                              PID:2364
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2836 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                              2⤵
                                PID:2664
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4356 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                                2⤵
                                  PID:1764
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4440 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                                  2⤵
                                    PID:2848
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3840 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                                    2⤵
                                      PID:1748
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1980 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                                      2⤵
                                        PID:2000
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=4200 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                                        2⤵
                                          PID:880
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3900 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:8
                                          2⤵
                                            PID:832
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --mojo-platform-channel-handle=2868 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                                            2⤵
                                              PID:1520
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3972 --field-trial-handle=1332,i,7661976666838503607,4936742406396127233,131072 /prefetch:1
                                              2⤵
                                                PID:1788
                                            • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                              "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                              1⤵
                                                PID:3044

                                              Network

                                              MITRE ATT&CK Enterprise v6

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                Filesize

                                                344B

                                                MD5

                                                33de5240685cbd606dc36c9b277a4dd3

                                                SHA1

                                                5ed8e12c0628423ac0ae155840ff5d6ab88a33cf

                                                SHA256

                                                a25f855c423d6f04115c1efdecaceef8de459ffa2598991cf2cc8c781ed9ef1e

                                                SHA512

                                                53d5d13fdc59e368bc04d30010f2a6cedfc8036f6d9a9cac4b2b8e732e7b779cd6d00d8e46165dd77a0a45c28733c698245330415770d3f992a7dd54159a6614

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                Filesize

                                                527B

                                                MD5

                                                07197c364d07a86b21ff2b402d034e78

                                                SHA1

                                                4bc78eb89f5a02d0bd5695030e60cc65487aac09

                                                SHA256

                                                5fc371f6a5b9a1196687bb8388c976715922d5b020e7dc53acad9b2e788a1baa

                                                SHA512

                                                d2615eb6b71ee45a568767031a4c8d6b5aa627153d6987c9f6e89151266d4e1ca1114f72a9c13054878ee4b766c8960181105beb4bb1dc2616f477c064ebd61e

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                4KB

                                                MD5

                                                16808e0a69366abb38152844fd1075ae

                                                SHA1

                                                5d2b2067a81ae80898ee4a5396d795fd6d9a3ab6

                                                SHA256

                                                59b026b9a6d3abf78132e1f74d3fbf79280971eb084d44aa381c8b33d52dac05

                                                SHA512

                                                2fc5eab16fea2de87704094826c548ce7760455bd1fbd811ddfb5cbb053f3d21ed09ad2499b020e4e1431354ef1e8291b783365340e3737ccce8f83d5958e7fe

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                Filesize

                                                4KB

                                                MD5

                                                2b134d82afe434c9957b2cd938023a87

                                                SHA1

                                                216b532284c5436be95691d6a307259199c2a990

                                                SHA256

                                                cacef62c8da93df5acece5d5ab2189eafad1ffd135763afef96e0fcdb4c80e91

                                                SHA512

                                                f7d3de462c45e5fa8494c640159aeb22c6f94efa08581d54d73a647982531aea79fed79a16e435f365ede507b2305d59bf150f06f3961e5d932e231712f1a6fa

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                18e723571b00fb1694a3bad6c78e4054

                                                SHA1

                                                afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                                SHA256

                                                8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                                SHA512

                                                43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                Filesize

                                                177KB

                                                MD5

                                                0d9bf06b1fea245c0587c6a33fe58286

                                                SHA1

                                                f9d8421805b3b03424fe1de02e362e514bdc7ad6

                                                SHA256

                                                c6120d3c5bfa0db14e115588e0d32a4e097f0b946fdf6d1721a4be273b41a1f7

                                                SHA512

                                                57179e3f3126e3c1ed1ce07a1223eb2016951d190a3c88e0b886b5b5cbfcb2865b2d19eecf3a4a70b69ba6b6b77ae236b47b4ca6f01a9f2a4316af8663861508

                                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                f50f89a0a91564d0b8a211f8921aa7de

                                                SHA1

                                                112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                SHA256

                                                b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                SHA512

                                                bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                              • C:\Users\Admin\AppData\Local\Temp\Cab6885.tmp

                                                Filesize

                                                62KB

                                                MD5

                                                3ac860860707baaf32469fa7cc7c0192

                                                SHA1

                                                c33c2acdaba0e6fa41fd2f00f186804722477639

                                                SHA256

                                                d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

                                                SHA512

                                                d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

                                              • C:\Users\Admin\AppData\Local\Temp\Tar6905.tmp

                                                Filesize

                                                164KB

                                                MD5

                                                4ff65ad929cd9a367680e0e5b1c08166

                                                SHA1

                                                c0af0d4396bd1f15c45f39d3b849ba444233b3a2

                                                SHA256

                                                c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

                                                SHA512

                                                f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

                                              • C:\Users\Admin\AppData\Local\Temp\_MEI27962\python311.dll

                                                Filesize

                                                1.6MB

                                                MD5

                                                5792adeab1e4414e0129ce7a228eb8b8

                                                SHA1

                                                e9f022e687b6d88d20ee96d9509f82e916b9ee8c

                                                SHA256

                                                7e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967

                                                SHA512

                                                c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b

                                              • \Users\Admin\AppData\Local\Temp\_MEI27962\python311.dll

                                                Filesize

                                                1.6MB

                                                MD5

                                                5792adeab1e4414e0129ce7a228eb8b8

                                                SHA1

                                                e9f022e687b6d88d20ee96d9509f82e916b9ee8c

                                                SHA256

                                                7e1370058177d78a415b7ed113cc15472974440d84267fc44cdc5729535e3967

                                                SHA512

                                                c8298b5780a2a5eebed070ac296eda6902b0cac9fda7bb70e21f482d6693d6d2631ca1ac4be96b75ac0dd50c9ca35be5d0aca9c4586ba7e58021edccd482958b

                                              • memory/2944-78-0x000007FEF5EF0000-0x000007FEF64D9000-memory.dmp

                                                Filesize

                                                5.9MB