Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26-04-2024 03:44
Static task
static1
Behavioral task
behavioral1
Sample
FiveM.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
FiveM.exe
Resource
win10v2004-20240412-en
General
-
Target
FiveM.exe
-
Size
5.0MB
-
MD5
22f583e4ab6ca6df2f4174105bab0d52
-
SHA1
9074acdd9ce8b350c07533da4ca05f3b327bf022
-
SHA256
9322adf8cbd368c56c40b048d57b9e589eb7f354a8bf04e908a2940f7f5ce268
-
SHA512
3799eb51d883e7c3502ea2e73e113bfc6aeb3c782a282eb7edb88252a52862900f2df71fd2a8b2f5d6505831be8b3169ba77337f3f1e2606daa0cb3319d15722
-
SSDEEP
49152:QOjPW6HEMvJ3oF0iM9BbR2fNIA0P6p2BrvkW1XoelgqcEmnK1uwg18Zv0eCbB4GM:PbvGJNIfKKFZMAf4L4AJN9Nf+BT
Malware Config
Signatures
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\Captures\desktop.ini svchost.exe File opened for modification C:\Users\Admin\AppData\Local\FiveM\FiveM.app\desktop.ini FiveM.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation CitizenFX.exe.new -
Deletes itself 1 IoCs
pid Process 960 CitizenFX.exe.new -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 4 IoCs
pid Process 960 CitizenFX.exe.new 5100 FiveM.exe 3952 FiveM.exe 2928 FiveM_b2699_DumpServer -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\Colors FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\Colors FiveM.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 FiveM.exe Set value (int) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff FiveM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" FiveM.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1132431369-515282257-1998160155-1000\{015EE879-A81A-4BA1-979A-70D90955AB4B} svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1132431369-515282257-1998160155-1000\{8FAEBC50-1FC7-402E-A7F9-E729353804C4} svchost.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff FiveM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ FiveM.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 960 CitizenFX.exe.new -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3036 FiveM.exe 3952 FiveM.exe 3952 FiveM.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3036 FiveM.exe 432 OpenWith.exe 3952 FiveM.exe 2524 OpenWith.exe 3952 FiveM.exe 3952 FiveM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3036 wrote to memory of 960 3036 FiveM.exe 93 PID 3036 wrote to memory of 960 3036 FiveM.exe 93 PID 960 wrote to memory of 5100 960 CitizenFX.exe.new 94 PID 960 wrote to memory of 5100 960 CitizenFX.exe.new 94 PID 5100 wrote to memory of 3952 5100 FiveM.exe 95 PID 5100 wrote to memory of 3952 5100 FiveM.exe 95 PID 3952 wrote to memory of 2928 3952 FiveM.exe 115 PID 3952 wrote to memory of 2928 3952 FiveM.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"1⤵
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.newCitizenFX.exe.new -bootstrap "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"4⤵
- Drops desktop.ini file(s)
- Executes dropped EXE
- Modifies Control Panel
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer"C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer" -dumpserver:2152 -parentpid:39525⤵
- Executes dropped EXE
PID:2928
-
-
-
-
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:1780
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Drops desktop.ini file(s)
- Checks processor information in registry
- Modifies registry class
PID:2616
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2524
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:3256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD53656c6636cd9dbceaf83230c3c9a2be9
SHA1989f27c6736a943fd4690091fed26f7c17e3c17f
SHA256f9ae094812ce9fbd56b58dab7739451792aba8f56c5f21eee15ef96682b413a6
SHA51252bbb8f2b2d6183f30b908d9171a2ec8c2128bbce145b7af0095d4c199b1ec431d650ec4ed0b1b6cbc7bcc8d29da3285cdcc61368faa8c4e57b45315ced4e4ad
-
Filesize
38KB
MD59a9812f429759ba7dafd3cae3ca399fb
SHA13f41e4f9ed953b0800cf9a1cd4ad29a0758256b8
SHA2567d01c11f35d87dd39327d7314c1a9563658c5a18fb5ae10abb485cbe856f5913
SHA512ef65a0d9ff8f3d8d4c786a1e760046b0eb29138669376bd73da7418ff886defd9871b026c869c605d759729f256098990e4181f38ed423d60548952b3151603f
-
Filesize
6B
MD56b0f5389ddf98641250f1202d5983fc1
SHA197c5cda53a154665f586d26e54d5025afb343936
SHA256a8e19a244050108f35667a95d25a15d4f808de9cfd0a1ecb4142a83249cc5719
SHA512ccdf12d494f668e037ed274be62d0370189c711392f4a56bbd82d6203227f1e2f532f068fcf80d42d5a752d4bc12682b179d1af7e04a1af66b23c6882ccd3f06
-
Filesize
1.8MB
MD5ba95fa20aa7b5bdff3b22b7dfd38586c
SHA1c4cb30c38c62524f801b2237d0c2a2337488502a
SHA2560f82998275981e6af23028fd707957336e48d8f297f3c26a9ea88ed167732c5c
SHA51208f089fd0e370d0065e8a7890b9377f1be36420da090a6d25ebdff4c28f5fb5019971c2b39810d5783387e2d894f460fa68d724dcd90059b53a9d05533b2af3c
-
Filesize
2.1MB
MD518afe34fb1d8d48952bbca3fcebe33a6
SHA16c6fe6f696510b8fdf492f948eb6e313c1897fdb
SHA25601277dadf2916a3a6f80256b6aff12c84b7ab44f1b5377f37108f61a95830bfd
SHA512b194590184c3148666df6344e7670c34230abb12913dd7e49354f75e648109619a0da0e6c54a3ab4b13cb654bd3c5344cb4b682a85c9b3020baa7aca12ab5226
-
Filesize
1.9MB
MD502a4ab185369e9551d691fd144ba0d6d
SHA1350f833cb638d77ce5c0de67b3c5d2f8bec755cb
SHA25682645dfd7a9af789ad0e13f7ef4f8912b67cfc2015e356b76e762df4a9798228
SHA51260a189027d6da4f7bc4950723558452effb3d8168c22c80f7500d6b95699624565dc77834917076526e4a0b7a2a645be5715b693795cb009fc16a6127dff0c33
-
Filesize
157B
MD5f9d948aa9426cb1a2a82e651b81a1912
SHA12d496caeef3b0bff6b91b99e58736cea51366348
SHA256b1fe21f251cf7875783ea162ef86c2a5b5022a1c5157bbb7972b6b34e14ec08a
SHA512a962fae3853f43e4a8e2b33aa5f51a917673d76648845dffcc32037c25cb3f300e4c4fc3ea633bf78b714449dbda84416e41cc16256373c170fb82d8485e3369
-
Filesize
5.0MB
MD5bd9ea45247073942b085310d23176cdc
SHA12e156bd30dc0b55a80fa7b67990bd3df60959c78
SHA256c7550ab54b375b7eb7c72ed69d94644fd4c11cb2edc5fc316845c64246a957b3
SHA512e9d522e05ec96cc07068fef5a79ecdb1781e70c3dd4169d95bbd477d8e06d3a92a09587dc9e4ca4ee6965b7c71947341c276304146db19f2a75cfd1998106007
-
Filesize
2KB
MD522df7776f703116bdf54c1075bc0f290
SHA1780b05f070ab1a350863af1b65b879dd6a904ac6
SHA256dbcc1f149682feb30a9343e5ee4538576985241554d1bad245fc650718f365f7
SHA51211a66e89f2f45d2e16ff10f2d9f5dbdb4aa5e5642bb1b3a9a9df88a31a405916c1551bb08acfca890a086480f6b9d66a5a79dec15a2191cd5ed0cdd64fa6914e
-
Filesize
190B
MD5b0d27eaec71f1cd73b015f5ceeb15f9d
SHA162264f8b5c2f5034a1e4143df6e8c787165fbc2f
SHA25686d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2
SHA5127b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c