Overview
overview
10Static
static
10wetransfer...33.zip
windows7-x64
1wetransfer...33.zip
windows10-2004-x64
1172K Italy...st.txt
windows7-x64
1172K Italy...st.txt
windows10-2004-x64
1179K Germa...st.txt
windows7-x64
1179K Germa...st.txt
windows10-2004-x64
13x 1-9 Skin FA.txt
windows7-x64
13x 1-9 Skin FA.txt
windows10-2004-x64
1447K HQ Ga...bo.zip
windows7-x64
1447K HQ Ga...bo.zip
windows10-2004-x64
1447K HQ Ga...bo.txt
windows7-x64
1447K HQ Ga...bo.txt
windows10-2004-x64
160K Spain ...st.txt
windows7-x64
160K Spain ...st.txt
windows10-2004-x64
1650K USA C...st.zip
windows7-x64
1650K USA C...st.zip
windows10-2004-x64
1650K USA C...st.txt
windows7-x64
1650K USA C...st.txt
windows10-2004-x64
1Fortnite.zip
windows7-x64
1Fortnite.zip
windows10-2004-x64
1Fortnite/c...og.txt
windows7-x64
1Fortnite/c...og.txt
windows10-2004-x64
1Fortnite/c...ig.yml
windows7-x64
3Fortnite/c...ig.yml
windows10-2004-x64
3Fortnite/s...se.txt
windows7-x64
1Fortnite/s...se.txt
windows10-2004-x64
1Fortnite/vosfn.exe
windows7-x64
7Fortnite/vosfn.exe
windows10-2004-x64
8(��@�0q.pyc
windows7-x64
(��@�0q.pyc
windows10-2004-x64
Minecraft.txt
windows7-x64
1Minecraft.txt
windows10-2004-x64
1Resubmissions
24-01-2025 21:43
250124-1kyzha1nhr 1024-01-2025 21:41
250124-1j76sazna1 1024-01-2025 21:40
250124-1jejga1naq 10Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 21:40
Behavioral task
behavioral1
Sample
wetransfer_hotmail-txt_2025-01-24_2133.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
wetransfer_hotmail-txt_2025-01-24_2133.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
172K Italy HQ Combolist.txt
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
172K Italy HQ Combolist.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
179K Germany HQ Combolist.txt
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
179K Germany HQ Combolist.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
3x 1-9 Skin FA.txt
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3x 1-9 Skin FA.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
447K HQ Gaming Combo.zip
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
447K HQ Gaming Combo.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
447K HQ Gaming Combo.txt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
447K HQ Gaming Combo.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
60K Spain HQ Combolist.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
60K Spain HQ Combolist.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
650K USA Combolist.zip
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
650K USA Combolist.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
650K USA Combolist.txt
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
650K USA Combolist.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Fortnite.zip
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Fortnite.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Fortnite/combos/log.txt
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Fortnite/combos/log.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Fortnite/config/config.yml
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Fortnite/config/config.yml
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Fortnite/skins_database.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Fortnite/skins_database.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Fortnite/vosfn.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Fortnite/vosfn.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
(��@�0q.pyc
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
(��@�0q.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Minecraft.txt
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Minecraft.txt
Resource
win10v2004-20241007-en
General
-
Target
Fortnite/config/config.yml
-
Size
340B
-
MD5
91692a4656bd8b65f6d46fdbfb64b8ec
-
SHA1
375d7ec031573f46596b91e4ef67a3b49582b588
-
SHA256
bf0fba940068c1f02ce6d4057ad9873e07c92159d47068562107383081bd4477
-
SHA512
c3047ccb239a3ef0a43ebe4fd8b1209175e7dfad3323bf69d585e6546bf9fab9c6265e9a7847a6fd4768ad89134b722e1094edd92ea19b2e60d4b2a3d97152c5
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2552 AcroRd32.exe 2552 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2932 2704 cmd.exe 32 PID 2704 wrote to memory of 2932 2704 cmd.exe 32 PID 2704 wrote to memory of 2932 2704 cmd.exe 32 PID 2932 wrote to memory of 2552 2932 rundll32.exe 33 PID 2932 wrote to memory of 2552 2932 rundll32.exe 33 PID 2932 wrote to memory of 2552 2932 rundll32.exe 33 PID 2932 wrote to memory of 2552 2932 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Fortnite\config\config.yml1⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Fortnite\config\config.yml2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Fortnite\config\config.yml"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5dd74fc303788efae05810f3440d6c0aa
SHA170786630c2db7d83e029084132049229a594ce17
SHA256ceb96cccba8231397edf599cf11c99d39693dec2bcc60aa2314778f24666f607
SHA512e18822306ab7f2f5da77892bb46275316d1544e29cb651ca6b4a9ca8403f9bfd10ad6005605042cdfa33c4dadba457cc2649bcce8cba297599d8fb2749a07f71