Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite Macros.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Fortnite Macros.exe
Resource
win10v2004-20231215-en
General
-
Target
Fortnite Macros.exe
-
Size
81KB
-
MD5
84a0089db4c0d6f6f423d5b819230dbe
-
SHA1
6d1d63cd3e9eebd21c801b0286032ddf2d7bf6e7
-
SHA256
03ae13cfa6be08f83c179c3713fe249fe4a8698934c1875c6d5e1e6d1216eb49
-
SHA512
7ea93f18da552335827205479762e8d75a6e0fc8a9e96a0b4d6e80dfb11ce8f24d5354b6325124b68777faa20d7ca7310a8b8529262d79b15f2d81e124e7571f
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/orRm:o23rbZi/8GprF3jg/oFm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2204 2668 Fortnite Macros.exe 29 PID 2668 wrote to memory of 2204 2668 Fortnite Macros.exe 29 PID 2668 wrote to memory of 2204 2668 Fortnite Macros.exe 29 PID 2668 wrote to memory of 2204 2668 Fortnite Macros.exe 29 PID 2204 wrote to memory of 2004 2204 cmd.exe 30 PID 2204 wrote to memory of 2004 2204 cmd.exe 30 PID 2204 wrote to memory of 2004 2204 cmd.exe 30 PID 2204 wrote to memory of 2004 2204 cmd.exe 30 PID 2668 wrote to memory of 1796 2668 Fortnite Macros.exe 31 PID 2668 wrote to memory of 1796 2668 Fortnite Macros.exe 31 PID 2668 wrote to memory of 1796 2668 Fortnite Macros.exe 31 PID 2668 wrote to memory of 1796 2668 Fortnite Macros.exe 31 PID 2668 wrote to memory of 2872 2668 Fortnite Macros.exe 33 PID 2668 wrote to memory of 2872 2668 Fortnite Macros.exe 33 PID 2668 wrote to memory of 2872 2668 Fortnite Macros.exe 33 PID 2668 wrote to memory of 2872 2668 Fortnite Macros.exe 33 PID 2668 wrote to memory of 1304 2668 Fortnite Macros.exe 32 PID 2668 wrote to memory of 1304 2668 Fortnite Macros.exe 32 PID 2668 wrote to memory of 1304 2668 Fortnite Macros.exe 32 PID 2668 wrote to memory of 1304 2668 Fortnite Macros.exe 32 PID 2668 wrote to memory of 2080 2668 Fortnite Macros.exe 34 PID 2668 wrote to memory of 2080 2668 Fortnite Macros.exe 34 PID 2668 wrote to memory of 2080 2668 Fortnite Macros.exe 34 PID 2668 wrote to memory of 2080 2668 Fortnite Macros.exe 34 PID 2080 wrote to memory of 2764 2080 cmd.exe 35 PID 2080 wrote to memory of 2764 2080 cmd.exe 35 PID 2080 wrote to memory of 2764 2080 cmd.exe 35 PID 2080 wrote to memory of 2764 2080 cmd.exe 35 PID 2668 wrote to memory of 1540 2668 Fortnite Macros.exe 36 PID 2668 wrote to memory of 1540 2668 Fortnite Macros.exe 36 PID 2668 wrote to memory of 1540 2668 Fortnite Macros.exe 36 PID 2668 wrote to memory of 1540 2668 Fortnite Macros.exe 36 PID 2668 wrote to memory of 2336 2668 Fortnite Macros.exe 37 PID 2668 wrote to memory of 2336 2668 Fortnite Macros.exe 37 PID 2668 wrote to memory of 2336 2668 Fortnite Macros.exe 37 PID 2668 wrote to memory of 2336 2668 Fortnite Macros.exe 37 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2764 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite Macros.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite Macros.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Fortnite Macros2⤵PID:1796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:1304
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:2872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:1540
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:2336
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750
-
Filesize
3B
MD5a5ea0ad9260b1550a14cc58d2c39b03d
SHA1f0aedf295071ed34ab8c6a7692223d22b6a19841
SHA256f1b2f662800122bed0ff255693df89c4487fbdcf453d3524a42d4ec20c3d9c04
SHA5127c735c613ece191801114785c1ee26a0485cbf1e8ee2c3b85ba1ad290ef75eec9fede5e1a5dc26d504701f3542e6b6457818f4c1d62448d0db40d5f35c357d74