Analysis
-
max time kernel
128s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2023 01:57
Static task
static1
Behavioral task
behavioral1
Sample
Fortect.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Fortect.exe
Resource
win10v2004-20230703-en
General
-
Target
Fortect.exe
-
Size
714KB
-
MD5
01712de1e76332696b79c25ee32c9704
-
SHA1
eaccbc242d11208d882e5e17b1e3c02adb78af33
-
SHA256
e531f1e904c4a4093a7cc9a960704e428d4bd1f6dd000aa06ec5aabdfc5f4cb7
-
SHA512
910d60cd5a90b93955da2186a9b23bf862b3aa8e2fc385138a89ab6ec9d0af91e16eb55b158dc22663f2e3f86277fc6e3e237f9a2a0cbf9c24d6fa562f4a60fb
-
SSDEEP
12288:iYhqRe1sCFnuulCRaIqZPPY1tXHFVX8JPMTz1:iYhqw1skn7lCsvQ11ldJl
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Fortect.ini Fortect.exe -
Loads dropped DLL 16 IoCs
pid Process 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe 4348 Fortect.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1804 WMIC.exe Token: SeSecurityPrivilege 1804 WMIC.exe Token: SeTakeOwnershipPrivilege 1804 WMIC.exe Token: SeLoadDriverPrivilege 1804 WMIC.exe Token: SeSystemProfilePrivilege 1804 WMIC.exe Token: SeSystemtimePrivilege 1804 WMIC.exe Token: SeProfSingleProcessPrivilege 1804 WMIC.exe Token: SeIncBasePriorityPrivilege 1804 WMIC.exe Token: SeCreatePagefilePrivilege 1804 WMIC.exe Token: SeBackupPrivilege 1804 WMIC.exe Token: SeRestorePrivilege 1804 WMIC.exe Token: SeShutdownPrivilege 1804 WMIC.exe Token: SeDebugPrivilege 1804 WMIC.exe Token: SeSystemEnvironmentPrivilege 1804 WMIC.exe Token: SeRemoteShutdownPrivilege 1804 WMIC.exe Token: SeUndockPrivilege 1804 WMIC.exe Token: SeManageVolumePrivilege 1804 WMIC.exe Token: 33 1804 WMIC.exe Token: 34 1804 WMIC.exe Token: 35 1804 WMIC.exe Token: 36 1804 WMIC.exe Token: SeIncreaseQuotaPrivilege 1804 WMIC.exe Token: SeSecurityPrivilege 1804 WMIC.exe Token: SeTakeOwnershipPrivilege 1804 WMIC.exe Token: SeLoadDriverPrivilege 1804 WMIC.exe Token: SeSystemProfilePrivilege 1804 WMIC.exe Token: SeSystemtimePrivilege 1804 WMIC.exe Token: SeProfSingleProcessPrivilege 1804 WMIC.exe Token: SeIncBasePriorityPrivilege 1804 WMIC.exe Token: SeCreatePagefilePrivilege 1804 WMIC.exe Token: SeBackupPrivilege 1804 WMIC.exe Token: SeRestorePrivilege 1804 WMIC.exe Token: SeShutdownPrivilege 1804 WMIC.exe Token: SeDebugPrivilege 1804 WMIC.exe Token: SeSystemEnvironmentPrivilege 1804 WMIC.exe Token: SeRemoteShutdownPrivilege 1804 WMIC.exe Token: SeUndockPrivilege 1804 WMIC.exe Token: SeManageVolumePrivilege 1804 WMIC.exe Token: 33 1804 WMIC.exe Token: 34 1804 WMIC.exe Token: 35 1804 WMIC.exe Token: 36 1804 WMIC.exe Token: SeIncreaseQuotaPrivilege 2724 WMIC.exe Token: SeSecurityPrivilege 2724 WMIC.exe Token: SeTakeOwnershipPrivilege 2724 WMIC.exe Token: SeLoadDriverPrivilege 2724 WMIC.exe Token: SeSystemProfilePrivilege 2724 WMIC.exe Token: SeSystemtimePrivilege 2724 WMIC.exe Token: SeProfSingleProcessPrivilege 2724 WMIC.exe Token: SeIncBasePriorityPrivilege 2724 WMIC.exe Token: SeCreatePagefilePrivilege 2724 WMIC.exe Token: SeBackupPrivilege 2724 WMIC.exe Token: SeRestorePrivilege 2724 WMIC.exe Token: SeShutdownPrivilege 2724 WMIC.exe Token: SeDebugPrivilege 2724 WMIC.exe Token: SeSystemEnvironmentPrivilege 2724 WMIC.exe Token: SeRemoteShutdownPrivilege 2724 WMIC.exe Token: SeUndockPrivilege 2724 WMIC.exe Token: SeManageVolumePrivilege 2724 WMIC.exe Token: 33 2724 WMIC.exe Token: 34 2724 WMIC.exe Token: 35 2724 WMIC.exe Token: 36 2724 WMIC.exe Token: SeIncreaseQuotaPrivilege 2724 WMIC.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3588 4348 Fortect.exe 82 PID 4348 wrote to memory of 3588 4348 Fortect.exe 82 PID 4348 wrote to memory of 3588 4348 Fortect.exe 82 PID 3588 wrote to memory of 1804 3588 cmd.exe 84 PID 3588 wrote to memory of 1804 3588 cmd.exe 84 PID 3588 wrote to memory of 1804 3588 cmd.exe 84 PID 4348 wrote to memory of 3972 4348 Fortect.exe 86 PID 4348 wrote to memory of 3972 4348 Fortect.exe 86 PID 4348 wrote to memory of 3972 4348 Fortect.exe 86 PID 3972 wrote to memory of 2724 3972 cmd.exe 88 PID 3972 wrote to memory of 2724 3972 cmd.exe 88 PID 3972 wrote to memory of 2724 3972 cmd.exe 88 PID 4348 wrote to memory of 4468 4348 Fortect.exe 89 PID 4348 wrote to memory of 4468 4348 Fortect.exe 89 PID 4348 wrote to memory of 4468 4348 Fortect.exe 89 PID 4468 wrote to memory of 2416 4468 cmd.exe 91 PID 4468 wrote to memory of 2416 4468 cmd.exe 91 PID 4468 wrote to memory of 2416 4468 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortect.exe"C:\Users\Admin\AppData\Local\Temp\Fortect.exe"1⤵
- Drops file in Windows directory
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe" path Win32_BIOS get SerialNumber2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe path Win32_BIOS get SerialNumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe" path Win32_DiskDrive get SerialNumber2⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe path Win32_DiskDrive get SerialNumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /Q /C "%SYSTEMROOT%\System32\wbem\wmic.exe" path Win32_ComputerSystemProduct get UUID2⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\wbem\WMIC.exeC:\Windows\System32\wbem\wmic.exe path Win32_ComputerSystemProduct get UUID3⤵PID:2416
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5f26199dd8e7cc2b8746f686b8546acde
SHA1aebc8d0265774fea38d6f3d8467e1a80ac19b28f
SHA256140a563d234e73ffee1ee3c2c76ae03d4966f57b7e4363622c002709eb8495ce
SHA51259fdf0173c8b58364b6edc18fa9844044101169382eb7dd981d5f5f4753d45cd164ee9a09eb72eb1511de46c6d4e6ff9317e0ba951cbecb18e31472419e71b9f
-
Filesize
24KB
MD55f8dddd0537cf9d33230c5f690c0eca0
SHA144cbe527b498656fd0af1c19576ec33066b8467c
SHA25609140b70aa226ccd3c4eb0ea5db056e4774004a96b4a32eeb1e51ecd799fdaea
SHA5120d5a4bfe5c90326b85d34aeb19a2d0ad9c5aec5892c7721177bf207fcf5c3b57ce420cbef827f18e6110ddcea72854957ddef8804fa3da772116cf74ff1b7e3a
-
Filesize
24KB
MD55f8dddd0537cf9d33230c5f690c0eca0
SHA144cbe527b498656fd0af1c19576ec33066b8467c
SHA25609140b70aa226ccd3c4eb0ea5db056e4774004a96b4a32eeb1e51ecd799fdaea
SHA5120d5a4bfe5c90326b85d34aeb19a2d0ad9c5aec5892c7721177bf207fcf5c3b57ce420cbef827f18e6110ddcea72854957ddef8804fa3da772116cf74ff1b7e3a
-
Filesize
27KB
MD5f920b104c2fe5ca6fedd2b5825544ee6
SHA123116ab1316a135c6507a532839dd63509039046
SHA2564cbc00b2ba0ce3052427a541d72501d45cbd93442a9a85ea249c2894df529000
SHA5125aa8142ad29b630278377fc05a02437c640670e011d20f1d3c18f06144a0eaee92775a55a6489b0372f59143df88aa15638cc4b3a47ed309e8bf25e87f920739
-
Filesize
27KB
MD5f920b104c2fe5ca6fedd2b5825544ee6
SHA123116ab1316a135c6507a532839dd63509039046
SHA2564cbc00b2ba0ce3052427a541d72501d45cbd93442a9a85ea249c2894df529000
SHA5125aa8142ad29b630278377fc05a02437c640670e011d20f1d3c18f06144a0eaee92775a55a6489b0372f59143df88aa15638cc4b3a47ed309e8bf25e87f920739
-
Filesize
27KB
MD5f920b104c2fe5ca6fedd2b5825544ee6
SHA123116ab1316a135c6507a532839dd63509039046
SHA2564cbc00b2ba0ce3052427a541d72501d45cbd93442a9a85ea249c2894df529000
SHA5125aa8142ad29b630278377fc05a02437c640670e011d20f1d3c18f06144a0eaee92775a55a6489b0372f59143df88aa15638cc4b3a47ed309e8bf25e87f920739
-
Filesize
27KB
MD5f920b104c2fe5ca6fedd2b5825544ee6
SHA123116ab1316a135c6507a532839dd63509039046
SHA2564cbc00b2ba0ce3052427a541d72501d45cbd93442a9a85ea249c2894df529000
SHA5125aa8142ad29b630278377fc05a02437c640670e011d20f1d3c18f06144a0eaee92775a55a6489b0372f59143df88aa15638cc4b3a47ed309e8bf25e87f920739
-
Filesize
45KB
MD59f3c809a6f525a8ef0c981c84113560e
SHA161770595387f4f6bceb8b7b4542730a865dffdbd
SHA2564d7a2d9151e02b971f38d10ffe8937f34227ad5a2ce11e7879df094482deca72
SHA5127ec73df64dcf2f4a394499601551b8d658ec11886709a4125c12a6116bd8864be2274d2b2cb54b3cd731ff75f7f969661c223832138c3243faea028cd71aba84
-
Filesize
45KB
MD59f3c809a6f525a8ef0c981c84113560e
SHA161770595387f4f6bceb8b7b4542730a865dffdbd
SHA2564d7a2d9151e02b971f38d10ffe8937f34227ad5a2ce11e7879df094482deca72
SHA5127ec73df64dcf2f4a394499601551b8d658ec11886709a4125c12a6116bd8864be2274d2b2cb54b3cd731ff75f7f969661c223832138c3243faea028cd71aba84
-
Filesize
45KB
MD59f3c809a6f525a8ef0c981c84113560e
SHA161770595387f4f6bceb8b7b4542730a865dffdbd
SHA2564d7a2d9151e02b971f38d10ffe8937f34227ad5a2ce11e7879df094482deca72
SHA5127ec73df64dcf2f4a394499601551b8d658ec11886709a4125c12a6116bd8864be2274d2b2cb54b3cd731ff75f7f969661c223832138c3243faea028cd71aba84
-
Filesize
45KB
MD59f3c809a6f525a8ef0c981c84113560e
SHA161770595387f4f6bceb8b7b4542730a865dffdbd
SHA2564d7a2d9151e02b971f38d10ffe8937f34227ad5a2ce11e7879df094482deca72
SHA5127ec73df64dcf2f4a394499601551b8d658ec11886709a4125c12a6116bd8864be2274d2b2cb54b3cd731ff75f7f969661c223832138c3243faea028cd71aba84
-
Filesize
45KB
MD59f3c809a6f525a8ef0c981c84113560e
SHA161770595387f4f6bceb8b7b4542730a865dffdbd
SHA2564d7a2d9151e02b971f38d10ffe8937f34227ad5a2ce11e7879df094482deca72
SHA5127ec73df64dcf2f4a394499601551b8d658ec11886709a4125c12a6116bd8864be2274d2b2cb54b3cd731ff75f7f969661c223832138c3243faea028cd71aba84
-
Filesize
64KB
MD5065130bd4bc3b4d769ffb0050a5464d0
SHA15997b2834e691d92cb109c808d9054e3fb43d7a7
SHA256568871b5048cf3e9a9c200c6527938fc616139353e084c43d283f96ba16b4ebb
SHA5129324c626714191fd6d621bded56137316ca23f8e14fa0923f7652465417523cfaca29b49ddc3d67989edaa8b88227a7ef499fdce2b2bf86d67b91158ae528b91
-
Filesize
32KB
MD5f64b9dfc805639380a2336bf2e803523
SHA19c0f3c905e819d4a212b225c5a23e07a5733a3cf
SHA25669cae8b431d364968bb4d77352718f7d862563ef3efd1d3d18da10b0c2813b2b
SHA5128cecb2915e747f0f803f4e8a153f67267a1760b6c1821dbb6d89c3e7af47888e6bf0efe9021c45a2aaec2f7afd5fd4b7d6619f4594409c88f047569cd73cb60a
-
Filesize
24KB
MD5921ae5351f80d55cce56054622f5add9
SHA1081641958f39ae91fb692a6874f66a47a929ae9c
SHA256eaeb1c53743c3540dbaaceeab03a57a0f16d43be593d87e16a5695298205ad04
SHA512f6b4bb59703169672c5de62252f69bdb8702f4f13193df9cd632bb4d8d45aef63a25594e340b898ade3f372f47a18b995133bfbadedaf6bb9d316af7b57d89b2
-
Filesize
30KB
MD5793c48821589c9fbf03cfa62a919df2d
SHA1b21b4ada7f689199e28984d57e5a10bf7d3f18be
SHA25611832e3c0dc402ef83c17b2ebf94c58e0299b95459aa8657abeac71c47d09b3b
SHA5129208c78e513ef4d60ea21e7254f8de9cf7677e3d38f9eb8bdfb9aa8573c36c32d0190b1b3bcde918e86741469312ef56f374153fec0cc2db0571ec94abc2c81d
-
Filesize
25KB
MD592e43d9e657a2366b412475683ad7b07
SHA19de0cd039d79bf90a407a09b283ecff5b511bd98
SHA2561093622ea8e01f5614f343603d8c622193eafa5b35773e5bd2c2dc0911f22a48
SHA512591d4bb819d5b8622dcc2be75ee78c25ac84da843a5cb6270046ad427f38e97e619dc5726a3aef2d3c202990d5ddc0bf1af1e7e7436ca3b18377871616e49181
-
Filesize
25KB
MD592e43d9e657a2366b412475683ad7b07
SHA19de0cd039d79bf90a407a09b283ecff5b511bd98
SHA2561093622ea8e01f5614f343603d8c622193eafa5b35773e5bd2c2dc0911f22a48
SHA512591d4bb819d5b8622dcc2be75ee78c25ac84da843a5cb6270046ad427f38e97e619dc5726a3aef2d3c202990d5ddc0bf1af1e7e7436ca3b18377871616e49181
-
Filesize
25KB
MD592e43d9e657a2366b412475683ad7b07
SHA19de0cd039d79bf90a407a09b283ecff5b511bd98
SHA2561093622ea8e01f5614f343603d8c622193eafa5b35773e5bd2c2dc0911f22a48
SHA512591d4bb819d5b8622dcc2be75ee78c25ac84da843a5cb6270046ad427f38e97e619dc5726a3aef2d3c202990d5ddc0bf1af1e7e7436ca3b18377871616e49181