Overview
overview
10Static
static
1fortnitepy...ES.bat
windows7-x64
10fortnitepy...ES.bat
windows10-2004-x64
10fortnitepy...OT.bat
windows7-x64
10fortnitepy...OT.bat
windows10-2004-x64
10fortnitepy...ite.py
windows7-x64
3fortnitepy...ite.py
windows10-2004-x64
3fortnitepy...t__.py
windows7-x64
3fortnitepy...t__.py
windows10-2004-x64
3fortnitepy...bot.py
windows7-x64
3fortnitepy...bot.py
windows10-2004-x64
3fortnitepy...ent.py
windows7-x64
3fortnitepy...ent.py
windows10-2004-x64
3fortnitepy...tic.py
windows7-x64
3fortnitepy...tic.py
windows10-2004-x64
3fortnitepy...ths.py
windows7-x64
3fortnitepy...ths.py
windows10-2004-x64
3fortnitepy...ors.py
windows7-x64
3fortnitepy...ors.py
windows10-2004-x64
3fortnitepy...tor.py
windows7-x64
3fortnitepy...tor.py
windows10-2004-x64
3fortnitepy...per.py
windows7-x64
3fortnitepy...per.py
windows10-2004-x64
3fortnitepy...rty.py
windows7-x64
3fortnitepy...rty.py
windows10-2004-x64
3fortnitepy...ngs.py
windows7-x64
3fortnitepy...ngs.py
windows10-2004-x64
3Resubmissions
21-02-2024 15:09
240221-sjgptshf7x 1021-02-2024 15:07
240221-shqlcahf6y 1021-02-2024 15:06
240221-sg6aeaac95 1021-02-2024 15:03
240221-se7qfsac57 1021-02-2024 15:02
240221-sejzdshf2s 1Analysis
-
max time kernel
363s -
max time network
364s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-02-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
fortnitepy-bot-master/fortnite.py
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
fortnitepy-bot-master/fortnite.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
fortnitepy-bot-master/partybot/helper.py
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
fortnitepy-bot-master/partybot/helper.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
fortnitepy-bot-master/partybot/party.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
fortnitepy-bot-master/partybot/party.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
fortnitepy-bot-master/partybot/settings.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
fortnitepy-bot-master/partybot/settings.py
Resource
win10v2004-20240221-en
General
-
Target
fortnitepy-bot-master/partybot/settings.py
-
Size
3KB
-
MD5
f5eed9e903918f4dbb5c4507d3c3c130
-
SHA1
5186abf11721a420061a2e93c3d1dd5d7a2ab6a8
-
SHA256
84bc7983272b0dc5102d9e6cbf548ff6b3f6c330c6ee4266b35050ba3f99d1a0
-
SHA512
f953b944fb0bfe769db24665606e9542590a616dc7a2825ab156678cfd7b76a355aedd642144eaea855aed1b7658aceda5d8d58c76763c04716e88922a707f06
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2608 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2608 AcroRd32.exe 2608 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2580 2792 cmd.exe 29 PID 2792 wrote to memory of 2580 2792 cmd.exe 29 PID 2792 wrote to memory of 2580 2792 cmd.exe 29 PID 2580 wrote to memory of 2608 2580 rundll32.exe 30 PID 2580 wrote to memory of 2608 2580 rundll32.exe 30 PID 2580 wrote to memory of 2608 2580 rundll32.exe 30 PID 2580 wrote to memory of 2608 2580 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\partybot\settings.py1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\partybot\settings.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\partybot\settings.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a8f2f616bf23bf7fbef34cfea7a4c1c1
SHA196e138bedcf68286e8da60981a0c819af9c1c3c9
SHA25659d26931194ca9f07b8e9b500b10f979ceb32615db5e2a4c7275c89521938498
SHA512f2a344f70e7c6ac95519e573f6301f1ff970d2367fd7bbe2a9ba8276f58887561032669c459b0dfc31d04dbe92dfafa730e10bf5289b0a9c2f6d709d9ae811e8