Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 06:31
Static task
static1
Behavioral task
behavioral1
Sample
Fortnite Macros.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Fortnite Macros.exe
Resource
win10v2004-20231215-en
General
-
Target
Fortnite Macros.exe
-
Size
81KB
-
MD5
84a0089db4c0d6f6f423d5b819230dbe
-
SHA1
6d1d63cd3e9eebd21c801b0286032ddf2d7bf6e7
-
SHA256
03ae13cfa6be08f83c179c3713fe249fe4a8698934c1875c6d5e1e6d1216eb49
-
SHA512
7ea93f18da552335827205479762e8d75a6e0fc8a9e96a0b4d6e80dfb11ce8f24d5354b6325124b68777faa20d7ca7310a8b8529262d79b15f2d81e124e7571f
-
SSDEEP
1536:o2Y0VNblnigen1FQGpaika1PASjg/orRm:o23rbZi/8GprF3jg/oFm
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 456 wrote to memory of 2944 456 Fortnite Macros.exe 84 PID 456 wrote to memory of 2944 456 Fortnite Macros.exe 84 PID 456 wrote to memory of 2944 456 Fortnite Macros.exe 84 PID 2944 wrote to memory of 340 2944 cmd.exe 85 PID 2944 wrote to memory of 340 2944 cmd.exe 85 PID 2944 wrote to memory of 340 2944 cmd.exe 85 PID 456 wrote to memory of 5108 456 Fortnite Macros.exe 86 PID 456 wrote to memory of 5108 456 Fortnite Macros.exe 86 PID 456 wrote to memory of 5108 456 Fortnite Macros.exe 86 PID 456 wrote to memory of 5112 456 Fortnite Macros.exe 87 PID 456 wrote to memory of 5112 456 Fortnite Macros.exe 87 PID 456 wrote to memory of 5112 456 Fortnite Macros.exe 87 PID 456 wrote to memory of 5008 456 Fortnite Macros.exe 88 PID 456 wrote to memory of 5008 456 Fortnite Macros.exe 88 PID 456 wrote to memory of 5008 456 Fortnite Macros.exe 88 PID 456 wrote to memory of 1428 456 Fortnite Macros.exe 89 PID 456 wrote to memory of 1428 456 Fortnite Macros.exe 89 PID 456 wrote to memory of 1428 456 Fortnite Macros.exe 89 PID 1428 wrote to memory of 4052 1428 cmd.exe 90 PID 1428 wrote to memory of 4052 1428 cmd.exe 90 PID 1428 wrote to memory of 4052 1428 cmd.exe 90 PID 456 wrote to memory of 4280 456 Fortnite Macros.exe 91 PID 456 wrote to memory of 4280 456 Fortnite Macros.exe 91 PID 456 wrote to memory of 4280 456 Fortnite Macros.exe 91 PID 456 wrote to memory of 2252 456 Fortnite Macros.exe 92 PID 456 wrote to memory of 2252 456 Fortnite Macros.exe 92 PID 456 wrote to memory of 2252 456 Fortnite Macros.exe 92 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4052 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite Macros.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite Macros.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵PID:340
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title Fortnite Macros2⤵PID:5108
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵PID:5112
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵PID:5008
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- Views/modifies file attributes
PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵PID:4280
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750