Analysis

  • max time kernel
    300s
  • max time network
    305s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 16:50

General

  • Target

    Fortnite Skin Swapper/jre/jrecriptforpatch.pdb

  • Size

    264KB

  • MD5

    a1a4535cbf26c5dfe313e981177abb61

  • SHA1

    1dfc326779dea1552df36eedf37107e5d91b0db4

  • SHA256

    ae0882a22ffabc175605e1f686f5141889a5b15cf480fa21c65b86017d2f0a16

  • SHA512

    dc9c43a5fb691d6df357b95fa21bcd9b1cea4bbc714025f814a80c6a5afa5142e60aa20adda047907d02eb479c713112bf3cdf6ca8beaff48c37fdbd83f8b577

  • SSDEEP

    3072:PSpOXmHTkfLvM86/3bVZiUDEiBeKmybcKZWvOhLUA1wcnfkH9K4fIGHJGp1WrSTi:+z06vbyeXe2lWvWwQ34FJGjWMi

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Fortnite Skin Swapper\jre\jrecriptforpatch.pdb"
    1⤵
    • Modifies registry class
    PID:4240
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads