| File name: | FORTNITE HACK 2022.rar |
| Full analysis: | https://app.any.run/tasks/48b3304a-5ca7-42bd-a006-7b3b1af461e9 |
| Verdict: | Malicious activity |
| Threats: | NanoCore is a Remote Access Trojan or RAT. This malware is highly customizable with plugins which allow attackers to tailor its functionality to their needs. Nanocore is created with the .NET framework and it’s available for purchase for just $25 from its “official” website. |
| Analysis date: | January 14, 2022, 23:53:15 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-rar |
| File info: | RAR archive data, v5 |
| MD5: | 9A235458C981FA0557A09DC23406A015 |
| SHA1: | 7F92C56CA50502946D668B44E724C6DA70737DC3 |
| SHA256: | 2182D4B3A11350FEEB3A79FF511EC0CAE64C0B70B54C2554821A89560B92A07C |
| SSDEEP: | 3072:Q7ZcRMDVU4d9VhNvt3KhWtqqh8hDgKwdv+MewGdD/PDlhl3i:+cRMD/dFHKAnh8hDgBdEwGl/PpPi |
| .rar | | | RAR compressed archive (v5.0) (61.5) |
|---|---|---|
| .rar | | | RAR compressed archive (gen) (38.4) |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 492 | taskkill /f /im "FORTNITE HACK 2022.exe" | C:\Windows\system32\taskkill.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Terminates Processes Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1552 | "schtasks.exe" /delete /f /tn "TCP Monitor Task" | C:\Windows\system32\schtasks.exe | — | FORTNITE HACK 2022.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1636 | "C:\Windows\system32\NOTEPAD.EXE" C:\Users\admin\AppData\Local\Temp\Rar$DIb3820.9571\READ ME.txt | C:\Windows\system32\NOTEPAD.EXE | — | WinRAR.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Notepad Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 2132 | ping -n 1 -w 3000 1.1.1.1 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3208 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.9112\FORTNITE HACK 2022.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.9112\FORTNITE HACK 2022.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3260 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.9112\FORTNITE HACK 2022.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.9112\FORTNITE HACK 2022.exe | FORTNITE HACK 2022.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3284 | "schtasks.exe" /delete /f /tn "TCP Monitor" | C:\Windows\system32\schtasks.exe | — | FORTNITE HACK 2022.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Manages scheduled tasks Exit code: 1 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3464 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe | WinRAR.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3604 | "C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe" | C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe | FORTNITE HACK 2022.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1 Modules
| |||||||||||||||
| 3684 | "cmd.exe" /C taskkill /f /im "FORTNITE HACK 2022.exe" & ping -n 1 -w 3000 1.1.1.1 & type nul > "C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe" & del /f /q "C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe" | C:\Windows\system32\cmd.exe | — | FORTNITE HACK 2022.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtBMP |
Value: | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes |
| Operation: | write | Name: | ShellExtIcon |
Value: | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\16C\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\Win7-KB3191566-x86.zip | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\FORTNITE HACK 2022.rar | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (3820) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3604 | FORTNITE HACK 2022.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\storage.dat | binary | |
MD5:— | SHA256:— | |||
| 3208 | FORTNITE HACK 2022.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\TCP Monitor\tcpmon.exe | executable | |
MD5:— | SHA256:— | |||
| 3464 | FORTNITE HACK 2022.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | text | |
MD5:— | SHA256:— | |||
| 3820 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.9112\FORTNITE HACK 2022.exe | executable | |
MD5:— | SHA256:— | |||
| 3208 | FORTNITE HACK 2022.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\run.dat | binary | |
MD5:— | SHA256:— | |||
| 3260 | FORTNITE HACK 2022.exe | C:\Program Files\TCP Monitor\tcpmon.exe | executable | |
MD5:— | SHA256:— | |||
| 3820 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb3820.9571\READ ME.txt | text | |
MD5:— | SHA256:— | |||
| 3820 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$EXb3820.5616\FORTNITE HACK 2022.exe | executable | |
MD5:— | SHA256:— | |||
| 3260 | FORTNITE HACK 2022.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\catalog.dat | bs | |
MD5:9E7D0351E4DF94A9B0BADCEB6A9DB963 | SHA256:AAFC7B40C5FE680A2BB549C3B90AABAAC63163F74FFFC0B00277C6BBFF88B757 | |||
| 3260 | FORTNITE HACK 2022.exe | C:\Users\admin\AppData\Roaming\90059C37-1320-41A4-B58D-2B75A9850D2F\settings.bin | binary | |
MD5:4E5E92E2369688041CC82EF9650EDED2 | SHA256:F8098A6290118F2944B9E7C842BD014377D45844379F863B00D54515A8A64B48 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3604 | FORTNITE HACK 2022.exe | 188.221.241.182:1337 | — | Sky UK Limited | GB | malicious |
3260 | FORTNITE HACK 2022.exe | 188.221.241.182:1337 | — | Sky UK Limited | GB | malicious |
PID | Process | Class | Message |
|---|---|---|---|
3604 | FORTNITE HACK 2022.exe | A Network Trojan was detected | ET TROJAN Possible NanoCore C2 60B |