Overview
overview
10Static
static
1fortnitepy...er.zip
windows7-x64
1fortnitepy...er.zip
windows10-2004-x64
1fortnitepy...ignore
windows7-x64
3fortnitepy...ignore
windows10-2004-x64
3fortnitepy...ES.bat
windows7-x64
10fortnitepy...ES.bat
windows10-2004-x64
10fortnitepy...ICENSE
windows7-x64
1fortnitepy...ICENSE
windows10-2004-x64
1fortnitepy...DME.md
windows7-x64
3fortnitepy...DME.md
windows10-2004-x64
3fortnitepy...OT.bat
windows7-x64
10fortnitepy...OT.bat
windows10-2004-x64
10fortnitepy...g.json
windows7-x64
3fortnitepy...g.json
windows10-2004-x64
3fortnitepy...s.json
windows7-x64
3fortnitepy...s.json
windows10-2004-x64
3fortnitepy...ite.py
windows7-x64
3fortnitepy...ite.py
windows10-2004-x64
3fortnitepy...t__.py
windows7-x64
3fortnitepy...t__.py
windows10-2004-x64
3fortnitepy...bot.py
windows7-x64
3fortnitepy...bot.py
windows10-2004-x64
3fortnitepy...ent.py
windows7-x64
3fortnitepy...ent.py
windows10-2004-x64
3fortnitepy...tic.py
windows7-x64
3fortnitepy...tic.py
windows10-2004-x64
3fortnitepy...ths.py
windows7-x64
3fortnitepy...ths.py
windows10-2004-x64
3fortnitepy...ors.py
windows7-x64
3fortnitepy...ors.py
windows10-2004-x64
3fortnitepy...tor.py
windows7-x64
3fortnitepy...tor.py
windows10-2004-x64
3Resubmissions
21/02/2024, 15:09
240221-sjgptshf7x 1021/02/2024, 15:07
240221-shqlcahf6y 1021/02/2024, 15:06
240221-sg6aeaac95 1021/02/2024, 15:03
240221-se7qfsac57 1021/02/2024, 15:02
240221-sejzdshf2s 1Analysis
-
max time kernel
359s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/02/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
fortnitepy-bot-master.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fortnitepy-bot-master.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
fortnitepy-bot-master/.gitignore
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
fortnitepy-bot-master/.gitignore
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
fortnitepy-bot-master/INSTALL PACKAGES.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
fortnitepy-bot-master/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
fortnitepy-bot-master/LICENSE
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
fortnitepy-bot-master/README.md
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
fortnitepy-bot-master/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
fortnitepy-bot-master/START BOT.bat
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
fortnitepy-bot-master/config.json
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
fortnitepy-bot-master/config.json
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
fortnitepy-bot-master/device_auths.json
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
fortnitepy-bot-master/device_auths.json
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
fortnitepy-bot-master/fortnite.py
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
fortnitepy-bot-master/fortnite.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
fortnitepy-bot-master/partybot/__init__.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
fortnitepy-bot-master/partybot/bot.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
fortnitepy-bot-master/partybot/client.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
fortnitepy-bot-master/partybot/cosmetic.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
fortnitepy-bot-master/partybot/deviceauths.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
fortnitepy-bot-master/partybot/errors.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
fortnitepy-bot-master/partybot/generator.py
Resource
win10v2004-20240221-en
General
-
Target
fortnitepy-bot-master/partybot/errors.py
-
Size
99B
-
MD5
c2dd0431e4a2c21ad38d0e8269392bdf
-
SHA1
7bf98ccf2a2b3b102fe3954686aa7a4958c981cc
-
SHA256
531554cda6ee827c1ff61ec722d32a57b59eb0ceb5cf631c4332c32f3475639b
-
SHA512
b57c080562da0c3e67d65b51c9f852a3085ef77d9876d9cb1fc779be45fb8ec3cacf61a73c52c8aa8dc2087f1389c92b094a22cbe455e92845f19005ea02fe23
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\py_auto_file\ rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2500 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2500 AcroRd32.exe 2500 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2648 2108 cmd.exe 29 PID 2108 wrote to memory of 2648 2108 cmd.exe 29 PID 2108 wrote to memory of 2648 2108 cmd.exe 29 PID 2648 wrote to memory of 2500 2648 rundll32.exe 30 PID 2648 wrote to memory of 2500 2648 rundll32.exe 30 PID 2648 wrote to memory of 2500 2648 rundll32.exe 30 PID 2648 wrote to memory of 2500 2648 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\partybot\errors.py1⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\partybot\errors.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\fortnitepy-bot-master\partybot\errors.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bd233be980954241f5e8e1bfb3eb2dd6
SHA1387d806dae748c5a1d01152781c26da6c1060b5b
SHA256af185d4bedbd0a22c42a6ab759a2dec1a77e7db83c324bb98b41f9f37d2d83a8
SHA512b807df68f3521a546bafa4e71fbec60e2c7315c927c605850b81cd13b007dd77140c11beecac11a1e252b55803608d75e4ec19e7ae00735b830abfb19e18833b