Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/07/2024, 01:03

General

  • Target

    FortniteV1.75/lunar-main/yolov7/deploy/triton-inference-server/render.py

  • Size

    3KB

  • MD5

    5ab58a1f4b531111f46d155170de986b

  • SHA1

    ce35f7addfdcd9749c6a5a7091a163a3d2c8aa8f

  • SHA256

    02ac8ec92278e3c04a1f7cb8814860bda15ef892bc4f9bc155bcc8a2c2c0675d

  • SHA512

    69ef51fde16c9e20e292c8636c856dca7776c72558bce855c43e7bcd1f6e66c42fa23ef317daba502ba48f69b4cdfd702e29f8564cd673f8c4dca06f8d03474a

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\FortniteV1.75\lunar-main\yolov7\deploy\triton-inference-server\render.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\FortniteV1.75\lunar-main\yolov7\deploy\triton-inference-server\render.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\FortniteV1.75\lunar-main\yolov7\deploy\triton-inference-server\render.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    ced5f02dc1f13a1da533b7d385d9740b

    SHA1

    179195721de883c78ae1846f27140881f07f7c5f

    SHA256

    df9ffce0807e9327218136e23a24dba42d6707d2fe25771305c289e9d77e8a36

    SHA512

    14c74f6034daaa8a28c36ebcf82b8e6350c7f286654d3b2866e135e553900b3120fefadbd0287fc9d86023844e33d853be6b688ad3e37ddba858e3dc2bfcd778