Resubmissions

26-04-2024 03:44

240426-ear8bahf21 6

26-04-2024 03:42

240426-d9rv6ahf28 6

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-04-2024 03:44

General

  • Target

    FiveM.exe

  • Size

    5.0MB

  • MD5

    22f583e4ab6ca6df2f4174105bab0d52

  • SHA1

    9074acdd9ce8b350c07533da4ca05f3b327bf022

  • SHA256

    9322adf8cbd368c56c40b048d57b9e589eb7f354a8bf04e908a2940f7f5ce268

  • SHA512

    3799eb51d883e7c3502ea2e73e113bfc6aeb3c782a282eb7edb88252a52862900f2df71fd2a8b2f5d6505831be8b3169ba77337f3f1e2606daa0cb3319d15722

  • SSDEEP

    49152:QOjPW6HEMvJ3oF0iM9BbR2fNIA0P6p2BrvkW1XoelgqcEmnK1uwg18Zv0eCbB4GM:PbvGJNIfKKFZMAf4L4AJN9Nf+BT

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Executes dropped EXE 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 22 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FiveM.exe
    "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
    1⤵
    • Modifies Control Panel
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.new
      CitizenFX.exe.new -bootstrap "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Users\Admin\AppData\Local\Temp\FiveM.exe
        "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Users\Admin\AppData\Local\FiveM\FiveM.exe
          "C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"
          4⤵
          • Drops desktop.ini file(s)
          • Executes dropped EXE
          • Modifies Control Panel
          • Modifies registry class
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3952
          • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer
            "C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer" -dumpserver:2152 -parentpid:3952
            5⤵
            • Executes dropped EXE
            PID:2928
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
      PID:1780
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:432
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Drops desktop.ini file(s)
      • Checks processor information in registry
      • Modifies registry class
      PID:2616
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2524
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService
      1⤵
      • Checks processor information in registry
      • Modifies registry class
      PID:3256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\platform-2612\data\control\settings.meta.tmp

      Filesize

      37KB

      MD5

      3656c6636cd9dbceaf83230c3c9a2be9

      SHA1

      989f27c6736a943fd4690091fed26f7c17e3c17f

      SHA256

      f9ae094812ce9fbd56b58dab7739451792aba8f56c5f21eee15ef96682b413a6

      SHA512

      52bbb8f2b2d6183f30b908d9171a2ec8c2128bbce145b7af0095d4c199b1ec431d650ec4ed0b1b6cbc7bcc8d29da3285cdcc61368faa8c4e57b45315ced4e4ad

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\platform-2944\data\control\settings.meta.tmp

      Filesize

      38KB

      MD5

      9a9812f429759ba7dafd3cae3ca399fb

      SHA1

      3f41e4f9ed953b0800cf9a1cd4ad29a0758256b8

      SHA256

      7d01c11f35d87dd39327d7314c1a9563658c5a18fb5ae10abb485cbe856f5913

      SHA512

      ef65a0d9ff8f3d8d4c786a1e760046b0eb29138669376bd73da7418ff886defd9871b026c869c605d759729f256098990e4181f38ed423d60548952b3151603f

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\release.txt

      Filesize

      6B

      MD5

      6b0f5389ddf98641250f1202d5983fc1

      SHA1

      97c5cda53a154665f586d26e54d5025afb343936

      SHA256

      a8e19a244050108f35667a95d25a15d4f808de9cfd0a1ecb4142a83249cc5719

      SHA512

      ccdf12d494f668e037ed274be62d0370189c711392f4a56bbd82d6203227f1e2f532f068fcf80d42d5a752d4bc12682b179d1af7e04a1af66b23c6882ccd3f06

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\scripting\lua\natives_universal.lua.tmp

      Filesize

      1.8MB

      MD5

      ba95fa20aa7b5bdff3b22b7dfd38586c

      SHA1

      c4cb30c38c62524f801b2237d0c2a2337488502a

      SHA256

      0f82998275981e6af23028fd707957336e48d8f297f3c26a9ea88ed167732c5c

      SHA512

      08f089fd0e370d0065e8a7890b9377f1be36420da090a6d25ebdff4c28f5fb5019971c2b39810d5783387e2d894f460fa68d724dcd90059b53a9d05533b2af3c

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\scripting\v8\natives_universal.d.ts.tmp

      Filesize

      2.1MB

      MD5

      18afe34fb1d8d48952bbca3fcebe33a6

      SHA1

      6c6fe6f696510b8fdf492f948eb6e313c1897fdb

      SHA256

      01277dadf2916a3a6f80256b6aff12c84b7ab44f1b5377f37108f61a95830bfd

      SHA512

      b194590184c3148666df6344e7670c34230abb12913dd7e49354f75e648109619a0da0e6c54a3ab4b13cb654bd3c5344cb4b682a85c9b3020baa7aca12ab5226

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\citizen\scripting\v8\natives_universal.js.tmp

      Filesize

      1.9MB

      MD5

      02a4ab185369e9551d691fd144ba0d6d

      SHA1

      350f833cb638d77ce5c0de67b3c5d2f8bec755cb

      SHA256

      82645dfd7a9af789ad0e13f7ef4f8912b67cfc2015e356b76e762df4a9798228

      SHA512

      60a189027d6da4f7bc4950723558452effb3d8168c22c80f7500d6b95699624565dc77834917076526e4a0b7a2a645be5715b693795cb009fc16a6127dff0c33

    • C:\Users\Admin\AppData\Local\FiveM\FiveM.app\desktop.ini

      Filesize

      157B

      MD5

      f9d948aa9426cb1a2a82e651b81a1912

      SHA1

      2d496caeef3b0bff6b91b99e58736cea51366348

      SHA256

      b1fe21f251cf7875783ea162ef86c2a5b5022a1c5157bbb7972b6b34e14ec08a

      SHA512

      a962fae3853f43e4a8e2b33aa5f51a917673d76648845dffcc32037c25cb3f300e4c4fc3ea633bf78b714449dbda84416e41cc16256373c170fb82d8485e3369

    • C:\Users\Admin\AppData\Local\Temp\CitizenFX.exe.new

      Filesize

      5.0MB

      MD5

      bd9ea45247073942b085310d23176cdc

      SHA1

      2e156bd30dc0b55a80fa7b67990bd3df60959c78

      SHA256

      c7550ab54b375b7eb7c72ed69d94644fd4c11cb2edc5fc316845c64246a957b3

      SHA512

      e9d522e05ec96cc07068fef5a79ecdb1781e70c3dd4169d95bbd477d8e06d3a92a09587dc9e4ca4ee6965b7c71947341c276304146db19f2a75cfd1998106007

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\FiveM.lnk

      Filesize

      2KB

      MD5

      22df7776f703116bdf54c1075bc0f290

      SHA1

      780b05f070ab1a350863af1b65b879dd6a904ac6

      SHA256

      dbcc1f149682feb30a9343e5ee4538576985241554d1bad245fc650718f365f7

      SHA512

      11a66e89f2f45d2e16ff10f2d9f5dbdb4aa5e5642bb1b3a9a9df88a31a405916c1551bb08acfca890a086480f6b9d66a5a79dec15a2191cd5ed0cdd64fa6914e

    • C:\Users\Admin\Videos\Captures\desktop.ini

      Filesize

      190B

      MD5

      b0d27eaec71f1cd73b015f5ceeb15f9d

      SHA1

      62264f8b5c2f5034a1e4143df6e8c787165fbc2f

      SHA256

      86d9f822aeb989755fac82929e8db369b3f5f04117ef96fd76e3d5f920a501d2

      SHA512

      7b5c9783a0a14b600b156825639d24cbbc000f5066c48ce9fecc195255603fc55129aaaca336d7ce6ad4e941d5492b756562f2c7a1d151fcfc2dabac76f3946c

    • memory/3952-897-0x00007FFD4F940000-0x00007FFD4F9FE000-memory.dmp

      Filesize

      760KB

    • memory/3952-898-0x00007FFD4E3C0000-0x00007FFD4E689000-memory.dmp

      Filesize

      2.8MB

    • memory/3952-900-0x00007FFD4F940000-0x00007FFD4F9FE000-memory.dmp

      Filesize

      760KB

    • memory/3952-901-0x00007FFD4E3C0000-0x00007FFD4E689000-memory.dmp

      Filesize

      2.8MB