Overview
overview
7Static
static
7AIO Giftca...re.exe
windows7-x64
7AIO Giftca...re.exe
windows10-2004-x64
7AIO Giftca...ox.exe
windows7-x64
3AIO Giftca...ox.exe
windows10-2004-x64
3AIO Giftca...32.exe
windows7-x64
1AIO Giftca...32.exe
windows10-2004-x64
3AIO Giftca...re.exe
windows7-x64
1AIO Giftca...re.exe
windows10-2004-x64
1Combo Edit...FS.exe
windows7-x64
1Combo Edit...FS.exe
windows10-2004-x64
3Combo Edit...le.dll
windows7-x64
1Combo Edit...le.dll
windows10-2004-x64
1Combo Edit...on.dll
windows7-x64
1Combo Edit...on.dll
windows10-2004-x64
1Combo Edit...or.exe
windows7-x64
7Combo Edit...or.exe
windows10-2004-x64
7Combo Edit...al.dll
windows7-x64
1Combo Edit...al.dll
windows10-2004-x64
1Combo Edit...ds.dll
windows7-x64
1Combo Edit...ds.dll
windows10-2004-x64
1Combo Edit...47.exe
windows7-x64
3Combo Edit...47.exe
windows10-2004-x64
3Combo Edit...ip.exe
windows7-x64
3Combo Edit...ip.exe
windows10-2004-x64
7Fortnite C...BW.exe
windows7-x64
7Fortnite C...BW.exe
windows10-2004-x64
7Fortnite C...32.exe
windows7-x64
1Fortnite C...32.exe
windows10-2004-x64
3Fortnite C...32.exe
windows7-x64
3Fortnite C...32.exe
windows10-2004-x64
3Fortnite C...ef.exe
windows7-x64
3Fortnite C...ef.exe
windows10-2004-x64
3Analysis
-
max time kernel
75s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 12:17
Behavioral task
behavioral1
Sample
AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AIO Giftcard Generator by Acquire\AIOgenerator by Acquire.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
AIO Giftcard Generator by Acquire\Qt5CoreVBox.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
AIO Giftcard Generator by Acquire\Qt5CoreVBox.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
AIO Giftcard Generator by Acquire\bin32.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
AIO Giftcard Generator by Acquire\bin32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
AIO Giftcard Generator by Acquire\core.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
AIO Giftcard Generator by Acquire\core.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
Combo Editor Sexitor by Calina\AlphaFS.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Combo Editor Sexitor by Calina\AlphaFS.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
Combo Editor Sexitor by Calina\Colorful.Console.dll
Resource
win7-20250207-en
Behavioral task
behavioral12
Sample
Combo Editor Sexitor by Calina\Colorful.Console.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
Combo Editor Sexitor by Calina\Newtonsoft.Json.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Combo Editor Sexitor by Calina\Newtonsoft.Json.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
Combo Editor Sexitor by Calina\Sexitor.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Combo Editor Sexitor by Calina\Sexitor.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
Combo Editor Sexitor by Calina\TrinitySeal.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Combo Editor Sexitor by Calina\TrinitySeal.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
Combo Editor Sexitor by Calina\WThreads.dll
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Combo Editor Sexitor by Calina\WThreads.dll
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
Combo Editor Sexitor by Calina\d3dcompiler_47.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Combo Editor Sexitor by Calina\d3dcompiler_47.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
Combo Editor Sexitor by Calina\strip.exe
Resource
win7-20250207-en
Behavioral task
behavioral24
Sample
Combo Editor Sexitor by Calina\strip.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
Fortnite Checker by Burnwood\Fortnite Checker BW.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Fortnite Checker by Burnwood\Fortnite Checker BW.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral27
Sample
Fortnite Checker by Burnwood\bin32.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Fortnite Checker by Burnwood\bin32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
Fortnite Checker by Burnwood\database32.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Fortnite Checker by Burnwood\database32.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
Fortnite Checker by Burnwood\libcef.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Fortnite Checker by Burnwood\libcef.exe
Resource
win10v2004-20250314-en
General
-
Target
Fortnite Checker by Burnwood\Fortnite Checker BW.exe
-
Size
482KB
-
MD5
47195a1409c12b69ab16e54d7384d7da
-
SHA1
a118a440006f07c65a5bed614e2f2a0311f59ae8
-
SHA256
65bbe881ecad501d055bb6141b112f2e2cba641a542ee1658a778e3f2ad3db23
-
SHA512
56752d716967d0c9963a2220590e44b6044421631c739c51474007bd8fac55a84a8aa71c984e3a6c495bb195cb21072e8036b6a3f3ddc87cc50747e00ad04c12
-
SSDEEP
6144:Z/fUyZ+wnOpvjiweFHDi+DZUdHDgKhvo3Wcq7o:igBnyveFHDHCDvoGcq7o
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 408 wscsvc.exe 4464 wupdater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fortnite Checker BW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language database32.dll -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1904 wrote to memory of 408 1904 Fortnite Checker BW.exe 88 PID 1904 wrote to memory of 408 1904 Fortnite Checker BW.exe 88 PID 1904 wrote to memory of 408 1904 Fortnite Checker BW.exe 88 PID 1904 wrote to memory of 3668 1904 Fortnite Checker BW.exe 89 PID 1904 wrote to memory of 3668 1904 Fortnite Checker BW.exe 89 PID 1904 wrote to memory of 3668 1904 Fortnite Checker BW.exe 89 PID 1904 wrote to memory of 4464 1904 Fortnite Checker BW.exe 90 PID 1904 wrote to memory of 4464 1904 Fortnite Checker BW.exe 90 PID 1904 wrote to memory of 4464 1904 Fortnite Checker BW.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite Checker by Burnwood\Fortnite Checker BW.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite Checker by Burnwood\Fortnite Checker BW.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\ProgramData\wscsvc\wscsvc.exeC:\ProgramData\\wscsvc\\wscsvc.exe ,.2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:408
-
-
C:\Users\Admin\AppData\Local\Temp\Fortnite Checker by Burnwood\database32.dlldatabase32.dll2⤵
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\ProgramData\wupdater\wupdater.exeC:\ProgramData\\wupdater\\wupdater.exe vNqykT6LjRGlFHTLAJQg7UOZ9CWK3l27KRLZW3AYEjuWnjZoCLANVFmuJCuFv7uM2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD5b9352fa2d673bf124116ba9e5639956e
SHA1f511f3b653fc0a7a3e49d1cc58c21c9a53fcf79b
SHA25658a0b8c13f085a3181fecc5d97cdfe5e35892af6b4b31d79657fc88512bb520d
SHA512eea7bd7ff2023e2239b6d5a5ba96d4ecdab4217ecdd6f7403947aa09b1dd54db533bde3b8ef2256cdb720086754c716842bf98810c135b4d72f281dfe5dd48df
-
Filesize
1.8MB
MD526f56121184843056f1d6e6db3f9844b
SHA1f8d6c767cab3be5e55608cc5abd30a4c383759e9
SHA2563ad26e1c16b6f49c6136c0c1c02c5943437349a310a6bcc5a8a0f4924a6f4ae4
SHA51213a0898a6780f474ab4ffe8e46ca0227f03f2c4d26daaf4b61862eb7374a65d887b96a8672f21247e7f3aac4c49cce77521dd1564983b52f8716219aff894b9d