Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 17:29
Behavioral task
behavioral1
Sample
Fortnite.zip
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
Fortnite.zip
Resource
win10v2004-20241007-en
collectioncredential_accessdefense_evasiondiscoveryexecutionpersistenceprivilege_escalationpyinstallerspywarestealerupx
30 signatures
150 seconds
General
-
Target
Fortnite.zip
-
Size
21.2MB
-
MD5
a6f7176d154c943ddb235aa60cabbee8
-
SHA1
116919fdf64b75bea1e997927492627697dd93f8
-
SHA256
88f51af987c4632ef1841cc4cde114614bb5d91219abc2dd4970cb162421376d
-
SHA512
76917cf938e8896d624cf948d52b267cca517060ad667b845faf0bd1aa0eb67b38f32e0a01f6d8e09663ddb97d9d1175caf7ca431c9e32aafa8a816b466a6748
-
SSDEEP
393216:bDQuAx1L6LkW9EWAa//MbJUsi3UlxhHDJM9iQSa3cOSLX1t54vZE9z6:bjqoLkW9FAa3MbJUSxDMQpPdXYE9W
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2428 7zFM.exe Token: 35 2428 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2428 7zFM.exe