Analysis

  • max time kernel
    40s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 01:03

General

  • Target

    FortniteV1.75/lunar-main/yolov7/deploy/triton-inference-server/processing.py

  • Size

    2KB

  • MD5

    10d9afe347da5e1e777c66b18cdbf9bd

  • SHA1

    9d3b980cb5fc3cb850972aac5d8f46465d264eea

  • SHA256

    65dc0b66699711606bf3b9267052f10bfa1d844280d161465169dc45631997c3

  • SHA512

    2686d51ea336e0c1b07bf031822c0ee0a8fc0618d7d2bf2e13dc61b22a265c8ef740da8cb3e371339c693bd0b2420d2d4a1740a829f37de19fd9d8c35f47d406

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\FortniteV1.75\lunar-main\yolov7\deploy\triton-inference-server\processing.py
    1⤵
    • Modifies registry class
    PID:1848
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5060

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads