Overview
overview
10Static
static
3FORTNITE-M...in.zip
windows10-2004-x64
10FORTNITE-M....5.exe
windows10-2004-x64
10FORTNITE-M...ly.dll
windows10-2004-x64
1FORTNITE-M...s.json
windows10-2004-x64
3FORTNITE-M...E.json
windows10-2004-x64
3FORTNITE-M...B.json
windows10-2004-x64
3FORTNITE-M...U.json
windows10-2004-x64
3FORTNITE-M...R.json
windows10-2004-x64
3FORTNITE-M...N.json
windows10-2004-x64
3FORTNITE-M...W.json
windows10-2004-x64
3FORTNITE-M...DME.md
windows10-2004-x64
3Analysis
-
max time kernel
77s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
FORTNITE-MACROS-EDITOR-V2.5-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/FORTNITE MACROS EDITOR V2.5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Family.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Hotkeys.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Language/de_DE.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Language/en_GB.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Language/ru_RU.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Language/tr_TR.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Language/zh_CN.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/Language/zh_TW.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
FORTNITE-MACROS-EDITOR-V2.5-main/README.md
Resource
win10v2004-20241007-en
General
-
Target
FORTNITE-MACROS-EDITOR-V2.5-main.zip
-
Size
4.1MB
-
MD5
3285ecc7759ee81d00084011f5ddc0f0
-
SHA1
addf04dcb1956dea31f2966a7348806d3ca36033
-
SHA256
0b0469b06437b67cc72a596ac417a8467a36e723c5691525c9af92aeec4f639b
-
SHA512
4c207af7da8b198061636b622b8577343a4a8a61c0859e0b9cd38b8b569b8aa5112548608a9c4242f74c8c29e3908fda2194fb49373c8bfcda66f36028174e47
-
SSDEEP
98304:exle8Y8SyX67ClS7bxsuvKedVdXbiXUAnm+qkGVqLCXjtBAdI3:ei8Yz3BX9vDpLiXUB+nG0LW/R
Malware Config
Extracted
lumma
https://covvercilverow.shop/api
https://surroundeocw.shop/api
https://abortinoiwiam.shop/api
https://pumpkinkwquo.shop/api
https://priooozekw.shop/api
https://deallyharvenw.shop/api
https://defenddsouneuw.shop/api
https://racedsuitreow.shop/api
https://roaddrermncomplai.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 10 IoCs
Processes:
FORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exepid Process 4224 FORTNITE MACROS EDITOR V2.5.exe 2716 FORTNITE MACROS EDITOR V2.5.exe 3388 FORTNITE MACROS EDITOR V2.5.exe 3464 FORTNITE MACROS EDITOR V2.5.exe 3320 FORTNITE MACROS EDITOR V2.5.exe 4476 FORTNITE MACROS EDITOR V2.5.exe 996 FORTNITE MACROS EDITOR V2.5.exe 1588 FORTNITE MACROS EDITOR V2.5.exe 3672 FORTNITE MACROS EDITOR V2.5.exe 3660 FORTNITE MACROS EDITOR V2.5.exe -
Loads dropped DLL 10 IoCs
Processes:
FORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exepid Process 4224 FORTNITE MACROS EDITOR V2.5.exe 2716 FORTNITE MACROS EDITOR V2.5.exe 3388 FORTNITE MACROS EDITOR V2.5.exe 3464 FORTNITE MACROS EDITOR V2.5.exe 3320 FORTNITE MACROS EDITOR V2.5.exe 4476 FORTNITE MACROS EDITOR V2.5.exe 996 FORTNITE MACROS EDITOR V2.5.exe 1588 FORTNITE MACROS EDITOR V2.5.exe 3672 FORTNITE MACROS EDITOR V2.5.exe 3660 FORTNITE MACROS EDITOR V2.5.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
FORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exedescription pid Process procid_target PID 4224 set thread context of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 2716 set thread context of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 3388 set thread context of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3464 set thread context of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3320 set thread context of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 4476 set thread context of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 996 set thread context of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 1588 set thread context of 3908 1588 FORTNITE MACROS EDITOR V2.5.exe 130 PID 3672 set thread context of 4580 3672 FORTNITE MACROS EDITOR V2.5.exe 134 PID 3660 set thread context of 3016 3660 FORTNITE MACROS EDITOR V2.5.exe 139 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeaspnet_regiis.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeaspnet_regiis.exeaspnet_regiis.exeaspnet_regiis.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeaspnet_regiis.exeaspnet_regiis.exeaspnet_regiis.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeaspnet_regiis.exeFORTNITE MACROS EDITOR V2.5.exeaspnet_regiis.exeaspnet_regiis.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FORTNITE MACROS EDITOR V2.5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Modifies registry class 1 IoCs
Processes:
OpenWith.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid Process 3668 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
7zFM.exepid Process 2804 7zFM.exe 2804 7zFM.exe 2804 7zFM.exe 2804 7zFM.exe 2804 7zFM.exe 2804 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
7zFM.exeOpenWith.exepid Process 2804 7zFM.exe 1708 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
7zFM.exedescription pid Process Token: SeRestorePrivilege 2804 7zFM.exe Token: 35 2804 7zFM.exe Token: SeSecurityPrivilege 2804 7zFM.exe Token: SeSecurityPrivilege 2804 7zFM.exe Token: SeSecurityPrivilege 2804 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
7zFM.exepid Process 2804 7zFM.exe 2804 7zFM.exe 2804 7zFM.exe 2804 7zFM.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
OpenWith.exepid Process 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe 1708 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7zFM.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exeFORTNITE MACROS EDITOR V2.5.exedescription pid Process procid_target PID 2804 wrote to memory of 4224 2804 7zFM.exe 94 PID 2804 wrote to memory of 4224 2804 7zFM.exe 94 PID 2804 wrote to memory of 4224 2804 7zFM.exe 94 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 4224 wrote to memory of 2220 4224 FORTNITE MACROS EDITOR V2.5.exe 100 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 2716 wrote to memory of 4484 2716 FORTNITE MACROS EDITOR V2.5.exe 105 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3388 wrote to memory of 2972 3388 FORTNITE MACROS EDITOR V2.5.exe 109 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3464 wrote to memory of 4724 3464 FORTNITE MACROS EDITOR V2.5.exe 115 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 3320 wrote to memory of 3372 3320 FORTNITE MACROS EDITOR V2.5.exe 118 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 4476 wrote to memory of 4340 4476 FORTNITE MACROS EDITOR V2.5.exe 122 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126 PID 996 wrote to memory of 3680 996 FORTNITE MACROS EDITOR V2.5.exe 126
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\FORTNITE-MACROS-EDITOR-V2.5-main.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\7zO4FA3E5E7\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\AppData\Local\Temp\7zO4FA3E5E7\FORTNITE MACROS EDITOR V2.5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2220
-
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4724
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3372
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4340
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3680
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3672 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4580
-
-
C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"C:\Users\Admin\Desktop\FORTNITE MACROS EDITOR V2.5.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Hotkeys.json2⤵
- Opens file in notepad (likely ransom note)
PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
550KB
MD5ee6be1648866b63fd7f860fa0114f368
SHA142cab62fff29eb98851b33986b637514fc904f4b
SHA256e17bf83e09457d8cecd1f3e903fa4c9770e17e823731650a453bc479591ac511
SHA512d6492d3b3c1d94d6c87b77a9a248e8c46b889d2e23938ddb8a8e242caccb23e8cd1a1fbeffee6b140cf6fd3ea7e8da89190286a912032ce4a671257bd8e3e28a
-
Filesize
642KB
MD59bc424be13dca227268ab018dca9ef0c
SHA1f6f42e926f511d57ef298613634f3a186ec25ddc
SHA25659d3999d0989c9c91dae93c26499f5a14b837a0fe56e6fc29f57456f54a1f8a2
SHA51270a1abb35bd95efc40af6653d5db2e155fab9a8575b7ae5b69ab3fbcd60925c66a675dac6cba57564a430e9b92f1a2ea9e912c4d7f356b82696ed77e92b52715
-
Filesize
413B
MD522d6840963463d4701c1007988b6d3d5
SHA1ac24b723ca95d43ffce537d862f9e4acd0ca63ac
SHA25674b3d5014c123d3bfcfbe8d671a22eece61f3b1d3c4feba93bc8105b67fc4d93
SHA512898d4dc5dd00c085a3375beefebae9826058d17c4eae66703ace6c8f56c6405d4c86728ea9ffc523ba45d219f9c6778c326e5f261b2729762386018c04475f32