Analysis

  • max time kernel
    70s
  • max time network
    87s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2024 03:14

General

  • Target

    https://cdn.discordapp.com/attachments/986686447979462666/986686841472290836/FortniteHack.rar?ex=668981ba&is=6688303a&hm=98fffaee4b66090773bca8fb3447b498fb1a169651c03f9ef7f4db720db29c9d&

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/986686447979462666/986686841472290836/FortniteHack.rar?ex=668981ba&is=6688303a&hm=98fffaee4b66090773bca8fb3447b498fb1a169651c03f9ef7f4db720db29c9d&
    1⤵
      PID:3848
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3804,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:1
      1⤵
        PID:4116
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3848,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=3872 /prefetch:1
        1⤵
          PID:2920
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4532,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:1
          1⤵
            PID:2268
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5508,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:8
            1⤵
              PID:3488
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5516,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:8
              1⤵
                PID:2460
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=5348,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:8
                1⤵
                  PID:2020
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5988,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:1
                  1⤵
                    PID:5072
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --field-trial-handle=6636,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6648 /prefetch:8
                    1⤵
                    • Drops file in Program Files directory
                    PID:3452
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6932,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6952 /prefetch:1
                    1⤵
                      PID:3088
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=7144,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=7240 /prefetch:8
                      1⤵
                        PID:4860
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=7288,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=7300 /prefetch:8
                        1⤵
                          PID:4492
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=5380,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:8
                          1⤵
                            PID:2576
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x458 0x51c
                            1⤵
                              PID:3460
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:4948
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2256
                                • C:\Windows\system32\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\FortniteHack.rar
                                  2⤵
                                  • Opens file in notepad (likely ransom note)
                                  PID:2984
                              • C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --field-trial-handle=6396,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:8
                                1⤵
                                  PID:3596
                                • C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --field-trial-handle=6396,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:8
                                  1⤵
                                    PID:100
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6280,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=7480 /prefetch:8
                                    1⤵
                                      PID:532

                                    Network

                                    MITRE ATT&CK Matrix

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads