Analysis
-
max time kernel
196s -
max time network
277s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 17:04
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/KyeOnDiscord/FortniteChecker/releases/download/2.0/FortniteChecker.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
https://github.com/KyeOnDiscord/FortniteChecker/releases/download/2.0/FortniteChecker.exe
Resource
win10v2004-20231222-en
General
-
Target
https://github.com/KyeOnDiscord/FortniteChecker/releases/download/2.0/FortniteChecker.exe
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2052 FortniteChecker.exe 1548 FortniteChecker.exe -
Loads dropped DLL 5 IoCs
pid Process 2440 chrome.exe 2412 chrome.exe 1060 chrome.exe 1644 Process not Found 1476 Process not Found -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe Token: SeShutdownPrivilege 1060 chrome.exe -
Suspicious use of FindShellTrayWindow 42 IoCs
pid Process 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe 1060 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1060 wrote to memory of 2196 1060 chrome.exe 28 PID 1060 wrote to memory of 2196 1060 chrome.exe 28 PID 1060 wrote to memory of 2196 1060 chrome.exe 28 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 1980 1060 chrome.exe 31 PID 1060 wrote to memory of 2824 1060 chrome.exe 30 PID 1060 wrote to memory of 2824 1060 chrome.exe 30 PID 1060 wrote to memory of 2824 1060 chrome.exe 30 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 PID 1060 wrote to memory of 2620 1060 chrome.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/KyeOnDiscord/FortniteChecker/releases/download/2.0/FortniteChecker.exe1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65a9758,0x7fef65a9768,0x7fef65a97782⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:22⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2212 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2220 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1324 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:22⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3612 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:1356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3640 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3620 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1596 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3628 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵
- Loads dropped DLL
PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1104 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵
- Loads dropped DLL
PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3676 --field-trial-handle=1208,i,5727364214175768208,8076265121109929225,131072 /prefetch:82⤵PID:2480
-
-
C:\Users\Admin\Downloads\FortniteChecker.exe"C:\Users\Admin\Downloads\FortniteChecker.exe"2⤵
- Executes dropped EXE
PID:2052
-
-
C:\Users\Admin\Downloads\FortniteChecker.exe"C:\Users\Admin\Downloads\FortniteChecker.exe"2⤵
- Executes dropped EXE
PID:1548
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\3c093803-69da-4bc0-940c-d180fff4da08.tmp
Filesize4KB
MD5764452c0e956693ab7c0813cfa2a5147
SHA1cfe0a97803a5ddb7594ea8a0345e44dee1ce97dd
SHA2562d233e1f4472e0219eeaa74402d00b3678162af42ae064629e2ea078d99dd83f
SHA512fb016d2f67f7dc8cef82a602b965d3edcf3df84ae6d4f7005380fa2aba03048c3c20e99621be61b311eea9fa2d37acebee47f83065d941e1114afca6db686ad1
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD548700d8621d26c2b26f8a9c5ce8bd6ec
SHA17bdbba2b194b58cd988d9d206f88aa6e3e894e0b
SHA256bab06ffea7e79435088eb214267a8cf064c440b3a24023b8e02b23dbed49be91
SHA512797a084af0898cac2b2f66cbacafd2a2abab1015bd1a1964f021f4dd86f1c70449b927d3f094ed0f5865ed37276d2ceb7298e405e3456f9acbc609fc45785b0f
-
Filesize
4KB
MD544a20e5d523db6a9d5aa9cc9bb014dd1
SHA143dcec084495dccb8fceaf1b6ca6a7b367e0edc5
SHA2560669be79932a89b994aff5feb7352de86c7065f4ff02f1379055da5b5bf709ad
SHA51259ea8edd4e5a65a7fd665118e13bcce448a3267d0270ade694a47082b0edb75e01337747a27ee75cf13df66dbcccbed2add225b986d6d161c3cf536334eef50d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1.3MB
MD5182a0d1f7d720f1e6c1cd7f86e5c8a54
SHA176963010d20dae57d4b7844573b674bd34feb6c5
SHA256811015513a1fa5123789f5a681dd5c8a05cf56e68760d65730c3853a72a20816
SHA512dccaaa9e4e3503d7da5faddf2e740d6455c136944e18f3fadcf63fd48120c67ea59afc17cc34ab27638b43636eb6f30444cd2bf8757842badd4084d3e3477a72