Analysis
-
max time kernel
70s -
max time network
87s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 03:14
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/986686447979462666/986686841472290836/FortniteHack.rar?ex=668981ba&is=6688303a&hm=98fffaee4b66090773bca8fb3447b498fb1a169651c03f9ef7f4db720db29c9d&
Resource
win10v2004-20240704-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
https://cdn.discordapp.com/attachments/986686447979462666/986686841472290836/FortniteHack.rar?ex=668981ba&is=6688303a&hm=98fffaee4b66090773bca8fb3447b498fb1a169651c03f9ef7f4db720db29c9d&
Score
4/10
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\FortniteHack.exe msedge.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\Readme.txt msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-661257284-3186977026-4220467887-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2984 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe 2256 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2984 2256 OpenWith.exe 110 PID 2256 wrote to memory of 2984 2256 OpenWith.exe 110
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/986686447979462666/986686841472290836/FortniteHack.rar?ex=668981ba&is=6688303a&hm=98fffaee4b66090773bca8fb3447b498fb1a169651c03f9ef7f4db720db29c9d&1⤵PID:3848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=3804,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:11⤵PID:4116
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=3848,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=3872 /prefetch:11⤵PID:2920
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --field-trial-handle=4532,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:11⤵PID:2268
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5508,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5544 /prefetch:81⤵PID:3488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5516,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5592 /prefetch:81⤵PID:2460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --field-trial-handle=5348,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6320 /prefetch:81⤵PID:2020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --field-trial-handle=5988,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:11⤵PID:5072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --field-trial-handle=6636,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6648 /prefetch:81⤵
- Drops file in Program Files directory
PID:3452
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=23 --field-trial-handle=6932,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6952 /prefetch:11⤵PID:3088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --field-trial-handle=7144,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=7240 /prefetch:81⤵PID:4860
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --field-trial-handle=7288,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=7300 /prefetch:81⤵PID:4492
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --field-trial-handle=5380,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:81⤵PID:2576
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x458 0x51c1⤵PID:3460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4948
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\FortniteHack.rar2⤵
- Opens file in notepad (likely ransom note)
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --field-trial-handle=6396,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:81⤵PID:3596
-
C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\126.0.2592.87\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --field-trial-handle=6396,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:81⤵PID:100
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=6280,i,17211346206607097582,14783440229797954268,262144 --variations-seed-version --mojo-platform-channel-handle=7480 /prefetch:81⤵PID:532