Analysis
-
max time kernel
1680s -
max time network
1685s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
01-03-2024 12:12
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/files/16339268/Fortnite_Aimbot.zip.html
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
https://www.upload.ee/files/16339268/Fortnite_Aimbot.zip.html
Resource
win11-20240221-en
General
-
Target
https://www.upload.ee/files/16339268/Fortnite_Aimbot.zip.html
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 2996 msedge.exe 2996 msedge.exe 3632 identity_helper.exe 3632 identity_helper.exe 1588 msedge.exe 1588 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe 2280 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 1568 2996 msedge.exe 78 PID 2996 wrote to memory of 1568 2996 msedge.exe 78 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 2112 2996 msedge.exe 79 PID 2996 wrote to memory of 3176 2996 msedge.exe 80 PID 2996 wrote to memory of 3176 2996 msedge.exe 80 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81 PID 2996 wrote to memory of 2152 2996 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.upload.ee/files/16339268/Fortnite_Aimbot.zip.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffbd8d3cb8,0x7fffbd8d3cc8,0x7fffbd8d3cd82⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6308 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6368 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6276 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,15234151887089639155,4985511627042297593,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2776
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53b1e59e67b947d63336fe9c8a1a5cebc
SHA15dc7146555c05d8eb1c9680b1b5c98537dd19b91
SHA2567fccd8c81f41a2684315ad9c86ef0861ecf1f2bf5d13050f760f52aef9b4a263
SHA5122d9b8f574f7f669c109f7e0d9714b84798e07966341a0200baac01ed5939b611c7ff75bf1978fe06e37e813df277b092ba68051fae9ba997fd529962e2e5d7b0
-
Filesize
152B
MD50e10a8550dceecf34b33a98b85d5fa0b
SHA1357ed761cbff74e7f3f75cd15074b4f7f3bcdce0
SHA2565694744f7e6c49068383af6569df880eed386f56062933708c8716f4221cac61
SHA512fe6815e41c7643ddb7755cc542d478814f47acea5339df0b5265d9969d02c59ece6fc61150c6c75de3f4f59b052bc2a4f58a14caa3675daeb67955b4dc416d3a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5c402c1a792ddc34f098ff9c6359720eb
SHA15e59ba1fba5dfb2b2b06d6efc9ebd155da953d0c
SHA2564d88611ce67ecbbc2ecce76612097fa6dec0cf5dd86b9a9f93739d25db317e04
SHA512b318a1c0e84a6aede25ecac68bbe3c7393af33e70998c27eb9f3fdd0e9ebf55698953ff3d2cc05b445d21f488ac6323565fec2ebb06795bf832211994d62effc
-
Filesize
2KB
MD567fa193c8b7e625eac6c140cc966e622
SHA1ff2170eb37d4d8bf5653420b5fddc1ae4a040843
SHA256308e95a179552cbf9977d952db56fb9b9a02eb5cfd3edddb0775177866e831ae
SHA5121fcab1ec7bcfdd098a711d9df5a11b7c94a57b6dd2e194b411ee07b5a29c0de61aaa4933e2b360483e8d37dfe81c43f90085499950416ec797332f4d3ce7e335
-
Filesize
5KB
MD5ec9f77b440eaa633358d1d57caf9b293
SHA124a3385f9edf02e9b23bdad4894da215b9e2a5ce
SHA2562b2ed286f8531d96c4ddbede4b0bbf4cd6d20a4089f3b741c3c782e2f38a4734
SHA5125eeb33b9dedfa3e9fbbbf578f00be7ffc0408d7ae648711e2b6e3085a05172f05733da68467ee23ecf4dfee35c754d54fe8b87958408430399a0d0e29180f5cd
-
Filesize
6KB
MD5b8d6d4eb663b290795664b7698038718
SHA16c9aaccd4a1493f0a6a3a5f3a99877b65a6987fc
SHA25646cd82381d3a024b05287168e1841fd23775bf1a1876987d5567272fed708669
SHA512717777610f97de1b97d534765f25e33c416668e867df202abfbe5366f5717b81150e5208af992fafb3ed53bc23feeca679f1372635860b63858ae5dac9fe1204
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD569d3c4855ed94eede8841dfc905b1b7b
SHA153877d7c8ae5cc57c8275bff8c2c4f38c0fef503
SHA25640a6b61714d692e5fa1ea37b54f4ed5302454aefb2b7a922f5245d9e233ac20c
SHA51233a97affcf94f008a85205031ea27f25035c877e5904dbcdba3dba735d5281c1eb6edb93c357562290b1c029f735eadc6b82bca71bbe334f9d7a57c47ad850a9