Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/08/2023, 04:11

230808-er5jzaae36 10

Analysis

  • max time kernel
    33s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/08/2023, 04:11

General

  • Target

    Fortnite Balls.exe

  • Size

    26.4MB

  • MD5

    acfcce2bfbc7bccd9c38757fe165e1f9

  • SHA1

    113f5295026bd2e5b5aecdfea817842e8564e671

  • SHA256

    bbfc8e548d2bde2e43b501b54b82bd75267e4b7fb9cbf5dfd76971b838c87858

  • SHA512

    2f5d7ced66e3aa8238cc8c857e6ed34f2c3509f12a242f5c46fa8dc4b794601d11f052442b61aeed1f024175cb077610637db9443dc915f0e4b179f67a7ff7ea

  • SSDEEP

    393216:Y/Fqyf/gsteVbFVQPndQuslSq9RoWOv+9fgSPBfMHKf:Y42QVbXQPndQuSborvSYSP+HO

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Fortnite Balls.exe
    "C:\Users\Admin\AppData\Local\Temp\Fortnite Balls.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:532
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 532 -s 1456
      2⤵
      • Program crash
      PID:1976
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 408 -p 532 -ip 532
    1⤵
      PID:2628

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/532-133-0x00007FFED4110000-0x00007FFED4BD1000-memory.dmp

      Filesize

      10.8MB

    • memory/532-134-0x0000000000470000-0x0000000001EDC000-memory.dmp

      Filesize

      26.4MB

    • memory/532-135-0x000000001CCF0000-0x000000001CD00000-memory.dmp

      Filesize

      64KB

    • memory/532-136-0x00007FFED4110000-0x00007FFED4BD1000-memory.dmp

      Filesize

      10.8MB

    • memory/532-137-0x000000001CCF0000-0x000000001CD00000-memory.dmp

      Filesize

      64KB

    • memory/532-138-0x00007FFED4110000-0x00007FFED4BD1000-memory.dmp

      Filesize

      10.8MB