Analysis
-
max time kernel
120s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 18:39
Behavioral task
behavioral1
Sample
FortniteInjector.exe
Resource
win7-20231215-en
General
-
Target
FortniteInjector.exe
-
Size
14.4MB
-
MD5
7fd7835215946026612456572996b4a4
-
SHA1
64b5f2d6a5fd2a36e70436af29deae0ceafbb457
-
SHA256
6bbd73fb9dbfa61e7e17f94f19087009bdeed47619c7fcdaa790afbd82f020fa
-
SHA512
d88e622f96631e639f44b516f3c89f1c3547840a3091b3535e0baed921e81e42d37ad1848732e79580ca3cf4347b83a1102678e45474692f3ddc19507f04886f
-
SSDEEP
393216:/X7QMidQuslSq99oWOv+9fgTz+qk7/MOw:/LQ3dQuSDorvSYTz+b/A
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2324 FortniteInjector.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2324 2420 FortniteInjector.exe 28 PID 2420 wrote to memory of 2324 2420 FortniteInjector.exe 28 PID 2420 wrote to memory of 2324 2420 FortniteInjector.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe"C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe"C:\Users\Admin\AppData\Local\Temp\FortniteInjector.exe"2⤵
- Loads dropped DLL
PID:2324
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5def4cf196b60d59f250df6602ebef5af
SHA105d5b9c5c145ef0994fd4ae14fad187e8f9edc2b
SHA25615368e285388875dfe8e8c9aa25e759b3d3a08294508bb37d4706ff36df6964f
SHA51240a8adae52a87f1869db5194584ca35ef6ff9074cd6b9ad5e3cd400c1d4ca96a688ea875f04e1e9d474aa0c4a410e2bfe3af790b1a7ef742b613d6871e8e748a
-
Filesize
471KB
MD5f5deaf6d1e5317c9c190b75b4688b0f4
SHA19627dc5a6bdf3eebdb99c0248c0efaead5890a03
SHA2561e199f2e6523914b96d1e842cd63319bfefe592c647277d4486f582fa4634ccf
SHA512f5403e776446c08f66ee887d494e393bbcdd1995bc8c3638f3a92c1c5e32acd086296f74711df393faacc275f8ce7fdd38cdf0f37970c76ff56a6a5e9ef0b2f9