Analysis
-
max time kernel
1562s -
max time network
1501s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-04-2024 03:42
Static task
static1
Behavioral task
behavioral1
Sample
FiveM.exe
Resource
win11-20240412-en
General
-
Target
FiveM.exe
-
Size
5.0MB
-
MD5
22f583e4ab6ca6df2f4174105bab0d52
-
SHA1
9074acdd9ce8b350c07533da4ca05f3b327bf022
-
SHA256
9322adf8cbd368c56c40b048d57b9e589eb7f354a8bf04e908a2940f7f5ce268
-
SHA512
3799eb51d883e7c3502ea2e73e113bfc6aeb3c782a282eb7edb88252a52862900f2df71fd2a8b2f5d6505831be8b3169ba77337f3f1e2606daa0cb3319d15722
-
SSDEEP
49152:QOjPW6HEMvJ3oF0iM9BbR2fNIA0P6p2BrvkW1XoelgqcEmnK1uwg18Zv0eCbB4GM:PbvGJNIfKKFZMAf4L4AJN9Nf+BT
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\FiveM\FiveM.app\desktop.ini FiveM.exe -
Deletes itself 1 IoCs
pid Process 3960 CitizenFX.exe.new -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 4 IoCs
pid Process 3960 CitizenFX.exe.new 3668 FiveM.exe 2840 FiveM.exe 1988 FiveM_b2699_DumpServer -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000\Control Panel\Colors FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000\Control Panel\Colors FiveM.exe -
Modifies registry class 23 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 FiveM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ FiveM.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2718508534-2116753757-2794822388-1000\{1AA0F5C1-677E-4A78-88A1-97F05B2533F2} svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 FiveM.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 FiveM.exe Key created \Registry\User\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\NotificationData FiveM.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2718508534-2116753757-2794822388-1000\{5669C19F-F7F1-487E-948F-F072AF55DBB6} svchost.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags FiveM.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-2718508534-2116753757-2794822388-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff FiveM.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3960 CitizenFX.exe.new -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1380 FiveM.exe 2840 FiveM.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1380 FiveM.exe 4768 OpenWith.exe 2840 FiveM.exe 2556 OpenWith.exe 2840 FiveM.exe 2840 FiveM.exe 3236 OpenWith.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1380 wrote to memory of 3960 1380 FiveM.exe 84 PID 1380 wrote to memory of 3960 1380 FiveM.exe 84 PID 3960 wrote to memory of 3668 3960 CitizenFX.exe.new 85 PID 3960 wrote to memory of 3668 3960 CitizenFX.exe.new 85 PID 3668 wrote to memory of 2840 3668 FiveM.exe 86 PID 3668 wrote to memory of 2840 3668 FiveM.exe 86 PID 2840 wrote to memory of 1988 2840 FiveM.exe 90 PID 2840 wrote to memory of 1988 2840 FiveM.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"1⤵
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.newCitizenFX.exe.new -bootstrap "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"4⤵
- Drops desktop.ini file(s)
- Executes dropped EXE
- Modifies Control Panel
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer"C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer" -dumpserver:2104 -parentpid:28405⤵
- Executes dropped EXE
PID:1988
-
-
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:1396
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:416
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2556
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:4864
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3236
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD53656c6636cd9dbceaf83230c3c9a2be9
SHA1989f27c6736a943fd4690091fed26f7c17e3c17f
SHA256f9ae094812ce9fbd56b58dab7739451792aba8f56c5f21eee15ef96682b413a6
SHA51252bbb8f2b2d6183f30b908d9171a2ec8c2128bbce145b7af0095d4c199b1ec431d650ec4ed0b1b6cbc7bcc8d29da3285cdcc61368faa8c4e57b45315ced4e4ad
-
Filesize
39KB
MD5619814b8b98007c1698576b7e4efb3ec
SHA1e60f3ceaf5ca78f74e6867f0b042951bffb91786
SHA25671ad5591441d62d02d2b62155abcf2cab587af49b86e2db5be6729a5b39df5d1
SHA51255ab0bd3c1750d63ad3304e63b7c26251f01c8994f385e5643e2bbd37fc6595fd0e9f5fc0d76aa655fe8ad3bc6fdee33248d9f4a76cce11a25d84c3f5de16236
-
Filesize
6B
MD56b0f5389ddf98641250f1202d5983fc1
SHA197c5cda53a154665f586d26e54d5025afb343936
SHA256a8e19a244050108f35667a95d25a15d4f808de9cfd0a1ecb4142a83249cc5719
SHA512ccdf12d494f668e037ed274be62d0370189c711392f4a56bbd82d6203227f1e2f532f068fcf80d42d5a752d4bc12682b179d1af7e04a1af66b23c6882ccd3f06
-
Filesize
1.8MB
MD5ba95fa20aa7b5bdff3b22b7dfd38586c
SHA1c4cb30c38c62524f801b2237d0c2a2337488502a
SHA2560f82998275981e6af23028fd707957336e48d8f297f3c26a9ea88ed167732c5c
SHA51208f089fd0e370d0065e8a7890b9377f1be36420da090a6d25ebdff4c28f5fb5019971c2b39810d5783387e2d894f460fa68d724dcd90059b53a9d05533b2af3c
-
Filesize
2.1MB
MD518afe34fb1d8d48952bbca3fcebe33a6
SHA16c6fe6f696510b8fdf492f948eb6e313c1897fdb
SHA25601277dadf2916a3a6f80256b6aff12c84b7ab44f1b5377f37108f61a95830bfd
SHA512b194590184c3148666df6344e7670c34230abb12913dd7e49354f75e648109619a0da0e6c54a3ab4b13cb654bd3c5344cb4b682a85c9b3020baa7aca12ab5226
-
Filesize
1.9MB
MD502a4ab185369e9551d691fd144ba0d6d
SHA1350f833cb638d77ce5c0de67b3c5d2f8bec755cb
SHA25682645dfd7a9af789ad0e13f7ef4f8912b67cfc2015e356b76e762df4a9798228
SHA51260a189027d6da4f7bc4950723558452effb3d8168c22c80f7500d6b95699624565dc77834917076526e4a0b7a2a645be5715b693795cb009fc16a6127dff0c33
-
Filesize
157B
MD5f9d948aa9426cb1a2a82e651b81a1912
SHA12d496caeef3b0bff6b91b99e58736cea51366348
SHA256b1fe21f251cf7875783ea162ef86c2a5b5022a1c5157bbb7972b6b34e14ec08a
SHA512a962fae3853f43e4a8e2b33aa5f51a917673d76648845dffcc32037c25cb3f300e4c4fc3ea633bf78b714449dbda84416e41cc16256373c170fb82d8485e3369
-
Filesize
5.0MB
MD5bd9ea45247073942b085310d23176cdc
SHA12e156bd30dc0b55a80fa7b67990bd3df60959c78
SHA256c7550ab54b375b7eb7c72ed69d94644fd4c11cb2edc5fc316845c64246a957b3
SHA512e9d522e05ec96cc07068fef5a79ecdb1781e70c3dd4169d95bbd477d8e06d3a92a09587dc9e4ca4ee6965b7c71947341c276304146db19f2a75cfd1998106007
-
Filesize
2KB
MD54bdf50c8f72f66fb4d6f9c2790808aad
SHA1d4612d1e53b511b2f95681190754b36f7cb09210
SHA2568dfa343e916eccd701d00a90dfbb3741d865d4fb7cf54a9722f7e5b45dc153d5
SHA512da1333fbdd6c7a629df232641d4e6e41c263c00994eb49612f049dd36fef26a7bddde480f27813368f734ae555608d2fd75fc8b634399c78d7b39b6b62de8d39
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c