Overview
overview
10Static
static
3FоrtniteHack.rar
windows7-x64
3FоrtniteHack.rar
windows10-2004-x64
7FоrtniteH...ck.exe
windows7-x64
3FоrtniteH...ck.exe
windows10-2004-x64
10FоrtniteH...-8.dll
windows7-x64
1FоrtniteH...-8.dll
windows10-2004-x64
1FоrtniteH...16.dll
windows7-x64
1FоrtniteH...16.dll
windows10-2004-x64
1FоrtniteH...er.vdf
windows7-x64
3FоrtniteH...er.vdf
windows10-2004-x64
3FоrtniteH...ns.txt
windows7-x64
1FоrtniteH...ns.txt
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
FоrtniteHack.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FоrtniteHack.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
FоrtniteHack/FоrtniteHack.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
FоrtniteHack/FоrtniteHack.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
FоrtniteHack/libnettle-8.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
FоrtniteHack/libnettle-8.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
FоrtniteHack/libpng16-16.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
FоrtniteHack/libpng16-16.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
FоrtniteHack/libraryfolder.vdf
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
FоrtniteHack/libraryfolder.vdf
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
FоrtniteHack/options.txt
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
FоrtniteHack/options.txt
Resource
win10v2004-20240221-en
General
-
Target
FоrtniteHack.rar
-
Size
478KB
-
MD5
c5f981bd03c41727387fafc51c0e7733
-
SHA1
36311d10792d81692027605c3bfa017dcd47fa59
-
SHA256
f78001da911cf47b929b3d97dcad6cea0bde92ab02087f80694dfebc8ce9aae2
-
SHA512
672867d2d1b01afed7e4b3dc6811bd98d0658d984dae257b32acca9d1f8e41c277347142931bf2e34b354ec0026af8b786c20fb6ba5042c461ac5728feed5de4
-
SSDEEP
12288:40RLfXcLUqW7p47JIcwwaNU9pwsARjze6ItiMSruB:4+LfEUP0JIHw6/pCSO
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2540 7zFM.exe Token: 35 2540 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 2540 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 2016 wrote to memory of 2540 2016 cmd.exe 7zFM.exe PID 2016 wrote to memory of 2540 2016 cmd.exe 7zFM.exe PID 2016 wrote to memory of 2540 2016 cmd.exe 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FоrtniteHack.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2540
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\FоrtniteHack.rar1⤵
- Suspicious use of WriteProcessMemory
PID:2016