Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2025, 02:02
Behavioral task
behavioral1
Sample
fornite-installer.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fornite-installer.jar
Resource
win10v2004-20241007-en
General
-
Target
fornite-installer.jar
-
Size
9.8MB
-
MD5
c40fb879e84a0ce48402c0f716c8627c
-
SHA1
03947ac1604329e3aec61ec72ffbf3cb96674f95
-
SHA256
f43ea2f9dcb6d967aa18a4459f9090a4a8315266fd947cf9bb54ba70911cbf79
-
SHA512
7ac75ece3fc025e9f551b43769ac72b573f6674b1a9c57142ba3cf5fbff10dca46ee80a23f7a7a6a5de211b6fe5294760636b6537c4d36ebf81fa9363a83f4f5
-
SSDEEP
196608:LG79YgrKPhPu8UHa7jNY9c9jfAPmpJLNLhVn+oeHbF3JY9znSBA8zk:qchP3pjeih/LNgoGFZYVSW8Y
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Home = "C:\\Program Files\\Java\\jre-1.8\\bin\\javaw.exe -jar C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\.tmp\\1736215365469.tmp" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 11 0.tcp.sa.ngrok.io 40 0.tcp.sa.ngrok.io 92 0.tcp.sa.ngrok.io -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3412 java.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3412 wrote to memory of 4820 3412 java.exe 83 PID 3412 wrote to memory of 4820 3412 java.exe 83 PID 3412 wrote to memory of 3556 3412 java.exe 85 PID 3412 wrote to memory of 3556 3412 java.exe 85 PID 3556 wrote to memory of 3916 3556 cmd.exe 87 PID 3556 wrote to memory of 3916 3556 cmd.exe 87 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4820 attrib.exe
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\fornite-installer.jar1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SYSTEM32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp2⤵
- Views/modifies file attributes
PID:4820
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c "REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp" /f"2⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\system32\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /v Home /d "C:\Program Files\Java\jre-1.8\bin\javaw.exe -jar C:\Users\Admin\AppData\Roaming\Microsoft\.tmp\1736215365469.tmp" /f3⤵
- Adds Run key to start application
PID:3916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.8MB
MD5c40fb879e84a0ce48402c0f716c8627c
SHA103947ac1604329e3aec61ec72ffbf3cb96674f95
SHA256f43ea2f9dcb6d967aa18a4459f9090a4a8315266fd947cf9bb54ba70911cbf79
SHA5127ac75ece3fc025e9f551b43769ac72b573f6674b1a9c57142ba3cf5fbff10dca46ee80a23f7a7a6a5de211b6fe5294760636b6537c4d36ebf81fa9363a83f4f5