Resubmissions

07/01/2025, 02:02

250107-cgdx6aymgw 10

07/01/2025, 01:57

250107-cdp61sylgs 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2025, 02:02

General

  • Target

    fornite-installer.jar

  • Size

    9.8MB

  • MD5

    c40fb879e84a0ce48402c0f716c8627c

  • SHA1

    03947ac1604329e3aec61ec72ffbf3cb96674f95

  • SHA256

    f43ea2f9dcb6d967aa18a4459f9090a4a8315266fd947cf9bb54ba70911cbf79

  • SHA512

    7ac75ece3fc025e9f551b43769ac72b573f6674b1a9c57142ba3cf5fbff10dca46ee80a23f7a7a6a5de211b6fe5294760636b6537c4d36ebf81fa9363a83f4f5

  • SSDEEP

    196608:LG79YgrKPhPu8UHa7jNY9c9jfAPmpJLNLhVn+oeHbF3JY9znSBA8zk:qchP3pjeih/LNgoGFZYVSW8Y

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe
    java -jar C:\Users\Admin\AppData\Local\Temp\fornite-installer.jar
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3412
    • C:\Windows\SYSTEM32\attrib.exe
      attrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp
      2⤵
      • Views/modifies file attributes
      PID:4820
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp" /f"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3556
      • C:\Windows\system32\reg.exe
        REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp" /f
        3⤵
        • Adds Run key to start application
        PID:3916

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp

    Filesize

    9.8MB

    MD5

    c40fb879e84a0ce48402c0f716c8627c

    SHA1

    03947ac1604329e3aec61ec72ffbf3cb96674f95

    SHA256

    f43ea2f9dcb6d967aa18a4459f9090a4a8315266fd947cf9bb54ba70911cbf79

    SHA512

    7ac75ece3fc025e9f551b43769ac72b573f6674b1a9c57142ba3cf5fbff10dca46ee80a23f7a7a6a5de211b6fe5294760636b6537c4d36ebf81fa9363a83f4f5

  • memory/3412-2-0x0000024CAC6B0000-0x0000024CAC920000-memory.dmp

    Filesize

    2.4MB

  • memory/3412-16-0x0000024CAC920000-0x0000024CAC930000-memory.dmp

    Filesize

    64KB

  • memory/3412-17-0x0000024CAC930000-0x0000024CAC940000-memory.dmp

    Filesize

    64KB

  • memory/3412-22-0x0000024CAC950000-0x0000024CAC960000-memory.dmp

    Filesize

    64KB

  • memory/3412-23-0x0000024CAC960000-0x0000024CAC970000-memory.dmp

    Filesize

    64KB

  • memory/3412-19-0x0000024CAC940000-0x0000024CAC950000-memory.dmp

    Filesize

    64KB

  • memory/3412-26-0x0000024CAC970000-0x0000024CAC980000-memory.dmp

    Filesize

    64KB

  • memory/3412-27-0x0000024CAC980000-0x0000024CAC990000-memory.dmp

    Filesize

    64KB

  • memory/3412-29-0x0000024CAC990000-0x0000024CAC9A0000-memory.dmp

    Filesize

    64KB

  • memory/3412-31-0x0000024CAC9A0000-0x0000024CAC9B0000-memory.dmp

    Filesize

    64KB

  • memory/3412-34-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-37-0x0000024CAC9B0000-0x0000024CAC9C0000-memory.dmp

    Filesize

    64KB

  • memory/3412-36-0x0000024CAC6B0000-0x0000024CAC920000-memory.dmp

    Filesize

    2.4MB

  • memory/3412-44-0x0000024CAC930000-0x0000024CAC940000-memory.dmp

    Filesize

    64KB

  • memory/3412-45-0x0000024CAC9C0000-0x0000024CAC9D0000-memory.dmp

    Filesize

    64KB

  • memory/3412-43-0x0000024CAC920000-0x0000024CAC930000-memory.dmp

    Filesize

    64KB

  • memory/3412-46-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-47-0x0000024CAC940000-0x0000024CAC950000-memory.dmp

    Filesize

    64KB

  • memory/3412-49-0x0000024CAC950000-0x0000024CAC960000-memory.dmp

    Filesize

    64KB

  • memory/3412-50-0x0000024CAC960000-0x0000024CAC970000-memory.dmp

    Filesize

    64KB

  • memory/3412-51-0x0000024CAC970000-0x0000024CAC980000-memory.dmp

    Filesize

    64KB

  • memory/3412-52-0x0000024CAC980000-0x0000024CAC990000-memory.dmp

    Filesize

    64KB

  • memory/3412-53-0x0000024CAC990000-0x0000024CAC9A0000-memory.dmp

    Filesize

    64KB

  • memory/3412-54-0x0000024CAC9A0000-0x0000024CAC9B0000-memory.dmp

    Filesize

    64KB

  • memory/3412-55-0x0000024CAC9B0000-0x0000024CAC9C0000-memory.dmp

    Filesize

    64KB

  • memory/3412-56-0x0000024CAC9C0000-0x0000024CAC9D0000-memory.dmp

    Filesize

    64KB

  • memory/3412-60-0x0000024CAC9D0000-0x0000024CAC9E0000-memory.dmp

    Filesize

    64KB

  • memory/3412-66-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-69-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-70-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-73-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-82-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-90-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-98-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-99-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-102-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-111-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-114-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-115-0x0000024CAC9E0000-0x0000024CAC9F0000-memory.dmp

    Filesize

    64KB

  • memory/3412-116-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-119-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-120-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-124-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-131-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-135-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-158-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-163-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-171-0x0000024CAAEC0000-0x0000024CAAEC1000-memory.dmp

    Filesize

    4KB

  • memory/3412-191-0x0000024CAC9E0000-0x0000024CAC9F0000-memory.dmp

    Filesize

    64KB

  • memory/3412-247-0x0000024CAC9F0000-0x0000024CACA00000-memory.dmp

    Filesize

    64KB

  • memory/3412-248-0x0000024CAC9F0000-0x0000024CACA00000-memory.dmp

    Filesize

    64KB

  • memory/3412-252-0x0000024CACA00000-0x0000024CACA10000-memory.dmp

    Filesize

    64KB