Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/12/2022, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Fortnite.exe
Resource
win10v2004-20221111-en
General
-
Target
Fortnite.exe
-
Size
88KB
-
MD5
03c214ed5ed9cf06d1268c7ea3d5c5e0
-
SHA1
3d9a14b6868dc6310d404f359125cf9da58014ba
-
SHA256
d17658c7bf8c23219b52fa871a7899c9e32039977a2aa69f82d5ad393a45d2f2
-
SHA512
6bcad960064f69096527dc3fb575fe09e594defeedfa11cdd981ffbab7e5c6801eb84d6bfd334f411388eda4f7b0f575b633f2c8f50d290e8a78bfa9953b9f69
-
SSDEEP
1536:zj7ftfkS5g9YOms+gZcQipICdXkNDqLLZX9lItVGL++eIOlnToIfwwzOh:z/FfHgTWmCRkGbKGLeNTBfwn
Malware Config
Signatures
-
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\wallpaper.jpg" reg.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 900 wrote to memory of 316 900 Fortnite.exe 28 PID 900 wrote to memory of 316 900 Fortnite.exe 28 PID 900 wrote to memory of 316 900 Fortnite.exe 28 PID 900 wrote to memory of 316 900 Fortnite.exe 28 PID 316 wrote to memory of 2004 316 cmd.exe 29 PID 316 wrote to memory of 2004 316 cmd.exe 29 PID 316 wrote to memory of 2004 316 cmd.exe 29 PID 316 wrote to memory of 1280 316 cmd.exe 30 PID 316 wrote to memory of 1280 316 cmd.exe 30 PID 316 wrote to memory of 1280 316 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\752.tmp\753.tmp\754.bat C:\Users\Admin\AppData\Local\Temp\Fortnite.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\system32\reg.exereg add "HKCU\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d "C:\Users\Admin\Pictures\wallpaper.jpg" /f3⤵
- Sets desktop wallpaper using registry
PID:2004
-
-
C:\Windows\system32\rundll32.exeRUNDLL32.EXE USER32.DLL,UpdatePerUserSystemParameters3⤵PID:1280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315B
MD5669ca360d34eb867b494b7e448047071
SHA1c26bf5ee846ca5a8ea34ae7e671ffd6c2023ff7d
SHA2561dffee16a637ed2028d4a4e45b528a26bc18cf161639eb7060313e405b84a33c
SHA51253545e4858cd8bd1bd7ed91edd3fed70c377a164f4a66abe311f918b1e462e4ae6ec8aa43818f4f7da768d5b0e4107aa4790dc1f0f92de04141b6bff7d9aca5e