Analysis

  • max time kernel
    120s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    08-01-2024 18:39

General

  • Target

    FortniteInjector.exe

  • Size

    14.4MB

  • MD5

    7fd7835215946026612456572996b4a4

  • SHA1

    64b5f2d6a5fd2a36e70436af29deae0ceafbb457

  • SHA256

    6bbd73fb9dbfa61e7e17f94f19087009bdeed47619c7fcdaa790afbd82f020fa

  • SHA512

    d88e622f96631e639f44b516f3c89f1c3547840a3091b3535e0baed921e81e42d37ad1848732e79580ca3cf4347b83a1102678e45474692f3ddc19507f04886f

  • SSDEEP

    393216:/X7QMidQuslSq99oWOv+9fgTz+qk7/MOw:/LQ3dQuSDorvSYTz+b/A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe
    "C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe
      "C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe"
      2⤵
      • Loads dropped DLL
      PID:2324

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI24202\python310.dll

    Filesize

    2.0MB

    MD5

    def4cf196b60d59f250df6602ebef5af

    SHA1

    05d5b9c5c145ef0994fd4ae14fad187e8f9edc2b

    SHA256

    15368e285388875dfe8e8c9aa25e759b3d3a08294508bb37d4706ff36df6964f

    SHA512

    40a8adae52a87f1869db5194584ca35ef6ff9074cd6b9ad5e3cd400c1d4ca96a688ea875f04e1e9d474aa0c4a410e2bfe3af790b1a7ef742b613d6871e8e748a

  • \Users\Admin\AppData\Local\Temp\_MEI24202\python310.dll

    Filesize

    471KB

    MD5

    f5deaf6d1e5317c9c190b75b4688b0f4

    SHA1

    9627dc5a6bdf3eebdb99c0248c0efaead5890a03

    SHA256

    1e199f2e6523914b96d1e842cd63319bfefe592c647277d4486f582fa4634ccf

    SHA512

    f5403e776446c08f66ee887d494e393bbcdd1995bc8c3638f3a92c1c5e32acd086296f74711df393faacc275f8ce7fdd38cdf0f37970c76ff56a6a5e9ef0b2f9