Analysis
-
max time kernel
386s -
max time network
1587s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
17/06/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
FiveM.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
FiveM.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
FiveM.exe
Resource
win10v2004-20240508-en
General
-
Target
FiveM.exe
-
Size
5.0MB
-
MD5
8aa0a7309117d546a9672863016e65f9
-
SHA1
66ec74e4e5ce2238d6f5b68c9dda80bcda3b6a7e
-
SHA256
fe7e9e548c9b9bdeb1a42c8ef43087ea58d4b64d72d0d561ba7c7477521444d1
-
SHA512
dc13a536c005da210499d8dbefa3850cf238b4cf4428e8acadebdaf0ad3bf69e90afa2db0db097c903905614c42314c3c3ba6c5230484a5dc1f82fc9276eec28
-
SSDEEP
49152:7OjPW6H/UikolCdofyUS6cR7OPQksBH2BAl1mmReL9odoKklkEuFsO5f5B1w2jkC:yckvcR3fj3F7njSBwkChUNniNdh7
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\FiveM\FiveM.app\desktop.ini FiveM.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 5100 FiveM.exe 4612 FiveM_b2699_DumpServer -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff FiveM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 FiveM.exe Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots FiveM.exe Set value (int) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags FiveM.exe Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU FiveM.exe Set value (data) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff FiveM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5100 FiveM.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5100 FiveM.exe 5100 FiveM.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3816 wrote to memory of 5100 3816 FiveM.exe 73 PID 3816 wrote to memory of 5100 3816 FiveM.exe 73 PID 5100 wrote to memory of 4612 5100 FiveM.exe 77 PID 5100 wrote to memory of 4612 5100 FiveM.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"C:\Users\Admin\AppData\Local\FiveM\FiveM.exe"2⤵
- Drops desktop.ini file(s)
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer"C:\Users\Admin\AppData\Local\FiveM\FiveM.app\data\cache\subprocess\FiveM_b2699_DumpServer" -dumpserver:1288 -parentpid:51003⤵
- Executes dropped EXE
PID:4612
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD53656c6636cd9dbceaf83230c3c9a2be9
SHA1989f27c6736a943fd4690091fed26f7c17e3c17f
SHA256f9ae094812ce9fbd56b58dab7739451792aba8f56c5f21eee15ef96682b413a6
SHA51252bbb8f2b2d6183f30b908d9171a2ec8c2128bbce145b7af0095d4c199b1ec431d650ec4ed0b1b6cbc7bcc8d29da3285cdcc61368faa8c4e57b45315ced4e4ad
-
Filesize
38KB
MD5f4b0befa84f85c366c270e9a301770c6
SHA1ea5e7ea8d41f5fb4d0db4a1f78b42642d696a3f3
SHA256efb166f6c297d8585f0a07113d5510b459734140e874d447424a71a3075dde75
SHA51276f59b8869ce1697e878fcdc33006b1605a122fbed71a191528dd4504f1e63c3d0aadb1f0bb6d785e384699ae6994bd874f07b50b7af429f5118241d192e5f69
-
Filesize
6B
MD5fcf3493d4e6141a09a5545ec0e5755ca
SHA1ff9f551c79a827965dcfedf1f16b94fadb6e2f3d
SHA256b9feb5024071270715158aff61173eff9470ae7389a2d15ed14050358b2d7d51
SHA5124c1a75349e428cbcb77364bd6038606238d236846745ff3d05bcd91640cb4145a5c367a26deae84fb1d481f5b94a707e491bfc7ac925d3514358a544dc8209fc
-
Filesize
1.8MB
MD5ae63da0d82569609d7a6d74c1f416670
SHA19095a1bc70f9930f444b9081f3e306c22da402b0
SHA2564de50d88d1aa69f45e5e0266d83e3a4297b8dc377cbc0e58214e733a1e3d9f0f
SHA5128676592b8e4cff95a24b869a21fdc9c0754fab4c787ccd46a06fc5e0cfa215bb24dd0729d73b5c972e9b6ee4696958ae9a735491f347191e58f50d286ef87460
-
Filesize
2.1MB
MD5b2ed540e76b17be956cfc83bacf7da9d
SHA1a6c636b9ba1b2ca5d669ef56708bc8ab39cfb15d
SHA256dc0118d2ee8119847b5acd4bb403bf5f37a11625491d0c2cd4f6058bb02cf06e
SHA512783af30aa5791764c3590cb242cc9a882cf48464cd6cd5ceaa849ce8a1e19ee7f4432967480be0c5989d0e1a173de82ee0b4f004f10b8ca448e2dc3929ce5a00
-
Filesize
1.9MB
MD5bfb480a6c455072c020fbfc59045cf49
SHA1bde1d63447a9387f854c1deca0d032283f6b525b
SHA25698c62f812d9e434f88000b0b22dadf029b0142e9bca452b8bc07a216d3d34687
SHA5126fe26fbaa694c26ddb51008f28ec637a4a921ad4e0dbb0e05ec0f0aa4dc6c3b7622c10e53cd4b3a5afc157b6ca87102f2eeceead11816d207e259aadffbe4959
-
Filesize
157B
MD5f9d948aa9426cb1a2a82e651b81a1912
SHA12d496caeef3b0bff6b91b99e58736cea51366348
SHA256b1fe21f251cf7875783ea162ef86c2a5b5022a1c5157bbb7972b6b34e14ec08a
SHA512a962fae3853f43e4a8e2b33aa5f51a917673d76648845dffcc32037c25cb3f300e4c4fc3ea633bf78b714449dbda84416e41cc16256373c170fb82d8485e3369
-
Filesize
5.0MB
MD58aa0a7309117d546a9672863016e65f9
SHA166ec74e4e5ce2238d6f5b68c9dda80bcda3b6a7e
SHA256fe7e9e548c9b9bdeb1a42c8ef43087ea58d4b64d72d0d561ba7c7477521444d1
SHA512dc13a536c005da210499d8dbefa3850cf238b4cf4428e8acadebdaf0ad3bf69e90afa2db0db097c903905614c42314c3c3ba6c5230484a5dc1f82fc9276eec28
-
Filesize
2KB
MD53e586f8219a22672329c910cd13f9929
SHA17936e52e79b7b9fc13bbd398ef2b519cf0cc7fca
SHA256260bcbd45ac18ae22f34bc7bf2fb5e438e9ac682f1bd87dd3983bd43b84001e1
SHA512e213da74708c19260b9d8648eec285a01617a9d03da6c7cf74b9888906040d721c3bcf949ba34a237e7335b90a70d0255a0f76622233ca07601da6b54553ba92