Resubmissions

26-04-2024 03:44

240426-ear8bahf21 6

26-04-2024 03:42

240426-d9rv6ahf28 6

Analysis

  • max time kernel
    1562s
  • max time network
    1501s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-04-2024 03:42

General

  • Target

    FiveM.exe

  • Size

    5.0MB

  • MD5

    22f583e4ab6ca6df2f4174105bab0d52

  • SHA1

    9074acdd9ce8b350c07533da4ca05f3b327bf022

  • SHA256

    9322adf8cbd368c56c40b048d57b9e589eb7f354a8bf04e908a2940f7f5ce268

  • SHA512

    3799eb51d883e7c3502ea2e73e113bfc6aeb3c782a282eb7edb88252a52862900f2df71fd2a8b2f5d6505831be8b3169ba77337f3f1e2606daa0cb3319d15722

  • SSDEEP

    49152:QOjPW6HEMvJ3oF0iM9BbR2fNIA0P6p2BrvkW1XoelgqcEmnK1uwg18Zv0eCbB4GM:PbvGJNIfKKFZMAf4L4AJN9Nf+BT

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Deletes itself 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 23 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FiveM.exe
    "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.new
      CitizenFX.exe.new -bootstrap "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Users\Admin\AppData\Local\Temp\FiveM.exe
        "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3668
        • C:\Users\Admin\AppData\Local\FiveM\FiveM.exe
          "C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"
          4⤵
          • Drops desktop.ini file(s)
          • Executes dropped EXE
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2840
          • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer
            "C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer" -dumpserver:2104 -parentpid:2840
            5⤵
            • Executes dropped EXE
            PID:1988
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
      PID:1396
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4768
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Drops desktop.ini file(s)
      • Checks processor information in registry
      • Modifies registry class
      PID:416
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2556
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Checks processor information in registry
      • Modifies registry class
      PID:4864
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3236

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\platform-2372\data\control\settings.meta.tmp

      Filesize

      37KB

      MD5

      3656c6636cd9dbceaf83230c3c9a2be9

      SHA1

      989f27c6736a943fd4690091fed26f7c17e3c17f

      SHA256

      f9ae094812ce9fbd56b58dab7739451792aba8f56c5f21eee15ef96682b413a6

      SHA512

      52bbb8f2b2d6183f30b908d9171a2ec8c2128bbce145b7af0095d4c199b1ec431d650ec4ed0b1b6cbc7bcc8d29da3285cdcc61368faa8c4e57b45315ced4e4ad

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\platform-3095\data\control\settings.meta.tmp

      Filesize

      39KB

      MD5

      619814b8b98007c1698576b7e4efb3ec

      SHA1

      e60f3ceaf5ca78f74e6867f0b042951bffb91786

      SHA256

      71ad5591441d62d02d2b62155abcf2cab587af49b86e2db5be6729a5b39df5d1

      SHA512

      55ab0bd3c1750d63ad3304e63b7c26251f01c8994f385e5643e2bbd37fc6595fd0e9f5fc0d76aa655fe8ad3bc6fdee33248d9f4a76cce11a25d84c3f5de16236

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\release.txt

      Filesize

      6B

      MD5

      6b0f5389ddf98641250f1202d5983fc1

      SHA1

      97c5cda53a154665f586d26e54d5025afb343936

      SHA256

      a8e19a244050108f35667a95d25a15d4f808de9cfd0a1ecb4142a83249cc5719

      SHA512

      ccdf12d494f668e037ed274be62d0370189c711392f4a56bbd82d6203227f1e2f532f068fcf80d42d5a752d4bc12682b179d1af7e04a1af66b23c6882ccd3f06

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\scripting\lua\natives_universal.lua.tmp

      Filesize

      1.8MB

      MD5

      ba95fa20aa7b5bdff3b22b7dfd38586c

      SHA1

      c4cb30c38c62524f801b2237d0c2a2337488502a

      SHA256

      0f82998275981e6af23028fd707957336e48d8f297f3c26a9ea88ed167732c5c

      SHA512

      08f089fd0e370d0065e8a7890b9377f1be36420da090a6d25ebdff4c28f5fb5019971c2b39810d5783387e2d894f460fa68d724dcd90059b53a9d05533b2af3c

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\scripting\v8\natives_universal.d.ts.tmp

      Filesize

      2.1MB

      MD5

      18afe34fb1d8d48952bbca3fcebe33a6

      SHA1

      6c6fe6f696510b8fdf492f948eb6e313c1897fdb

      SHA256

      01277dadf2916a3a6f80256b6aff12c84b7ab44f1b5377f37108f61a95830bfd

      SHA512

      b194590184c3148666df6344e7670c34230abb12913dd7e49354f75e648109619a0da0e6c54a3ab4b13cb654bd3c5344cb4b682a85c9b3020baa7aca12ab5226

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\scripting\v8\natives_universal.js.tmp

      Filesize

      1.9MB

      MD5

      02a4ab185369e9551d691fd144ba0d6d

      SHA1

      350f833cb638d77ce5c0de67b3c5d2f8bec755cb

      SHA256

      82645dfd7a9af789ad0e13f7ef4f8912b67cfc2015e356b76e762df4a9798228

      SHA512

      60a189027d6da4f7bc4950723558452effb3d8168c22c80f7500d6b95699624565dc77834917076526e4a0b7a2a645be5715b693795cb009fc16a6127dff0c33

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\desktop.ini

      Filesize

      157B

      MD5

      f9d948aa9426cb1a2a82e651b81a1912

      SHA1

      2d496caeef3b0bff6b91b99e58736cea51366348

      SHA256

      b1fe21f251cf7875783ea162ef86c2a5b5022a1c5157bbb7972b6b34e14ec08a

      SHA512

      a962fae3853f43e4a8e2b33aa5f51a917673d76648845dffcc32037c25cb3f300e4c4fc3ea633bf78b714449dbda84416e41cc16256373c170fb82d8485e3369

    • C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.new

      Filesize

      5.0MB

      MD5

      bd9ea45247073942b085310d23176cdc

      SHA1

      2e156bd30dc0b55a80fa7b67990bd3df60959c78

      SHA256

      c7550ab54b375b7eb7c72ed69d94644fd4c11cb2edc5fc316845c64246a957b3

      SHA512

      e9d522e05ec96cc07068fef5a79ecdb1781e70c3dd4169d95bbd477d8e06d3a92a09587dc9e4ca4ee6965b7c71947341c276304146db19f2a75cfd1998106007

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\FiveM.lnk

      Filesize

      2KB

      MD5

      4bdf50c8f72f66fb4d6f9c2790808aad

      SHA1

      d4612d1e53b511b2f95681190754b36f7cb09210

      SHA256

      8dfa343e916eccd701d00a90dfbb3741d865d4fb7cf54a9722f7e5b45dc153d5

      SHA512

      da1333fbdd6c7a629df232641d4e6e41c263c00994eb49612f049dd36fef26a7bddde480f27813368f734ae555608d2fd75fc8b634399c78d7b39b6b62de8d39

    • C:\Users\Admin\Videos\Captures\desktop.ini

      Filesize

      190B

      MD5

      b0d27eaec71f1cd73b015f5ceeb15f9d

      SHA1

      62264f8b5c2f5034a1e4143df6e8c787165fbc2f

      SHA256

      86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

      SHA512

      7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

    • memory/2840-898-0x00007FFFC8AD0000-0x00007FFFC8B8D000-memory.dmp

      Filesize

      756KB

    • memory/2840-899-0x00007FFFC6CA0000-0x00007FFFC7014000-memory.dmp

      Filesize

      3.5MB

    • memory/2840-905-0x00007FFFC8AD0000-0x00007FFFC8B8D000-memory.dmp

      Filesize

      756KB

    • memory/2840-906-0x00007FFFC6CA0000-0x00007FFFC7014000-memory.dmp

      Filesize

      3.5MB