Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1730s -
max time network
1742s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/03/2024, 12:09
Behavioral task
behavioral1
Sample
Fortnite AimBot.exe
Resource
win11-20240221-en
General
-
Target
Fortnite AimBot.exe
-
Size
78KB
-
MD5
20040d1c7db4f41b5037e8f72282dad9
-
SHA1
d4a6988687d5b767922964c258257fa806d4464d
-
SHA256
28741c4bc220c52dd24ec45641072ae3fc319586e1c94886850ef0e74ddb95c5
-
SHA512
233883dc0e0a0cc8474ce9c8a6fe5f98b7494f3a406d23ea32c6aca72d402308c8f9e1409af6b4fbaa5e93ac96efe5393fcc9c00e2b45a5c8c897ed403860677
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+IPIC:5Zv5PDwbjNrmAE+MIC
Malware Config
Extracted
discordrat
-
discord_token
MTIxMzAyMTg5MDU1MDA0MjY2Ng.GSmB4g.z7mEl4nRyHZl4zLjxgwZ_ERwgZQJEakPOZ1N4I
-
server_id
1213023729379053639
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 discord.com 4 discord.com 15 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1996 msedge.exe 1996 msedge.exe 2368 msedge.exe 2368 msedge.exe 3732 msedge.exe 3732 msedge.exe 696 identity_helper.exe 696 identity_helper.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe 2112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 232 Fortnite AimBot.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2764 2368 msedge.exe 93 PID 2368 wrote to memory of 2764 2368 msedge.exe 93 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1360 2368 msedge.exe 94 PID 2368 wrote to memory of 1996 2368 msedge.exe 95 PID 2368 wrote to memory of 1996 2368 msedge.exe 95 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96 PID 2368 wrote to memory of 4808 2368 msedge.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fortnite AimBot.exe"C:\Users\Admin\AppData\Local\Temp\Fortnite AimBot.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:232
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5104
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffae2a73cb8,0x7ffae2a73cc8,0x7ffae2a73cd82⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1948 /prefetch:22⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2536 /prefetch:82⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:1520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3872 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1932,9072322069619604689,14626267724545907202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce319bd3ed3c89069337a6292042bbe0
SHA17e058bce90e1940293044abffe993adf67d8d888
SHA25634070e3eea41c0e180cb5541de76cea15ef6f9e5c641e922d82a2d97bdce3aa3
SHA512d42f7fc32a337ecd3a24bcbf6cd6155852646cae5fb499003356f713b791881fc2e46825c4ff61d09db2289f25c0992c10d6fadb560a9bea33284bd5acc449f7
-
Filesize
152B
MD512b71c4e45a845b5f29a54abb695e302
SHA18699ca2c717839c385f13fb26d111e57a9e61d6f
SHA256c353020621fa6cea80eaa45215934d5f44f181ffa1a673cdb7880f20a4e898e0
SHA51209f0d1a739102816c5a29106343d3b5bb54a31d67ddbfcfa21306b1a6d87eaa35a9a2f0358e56cc0f78be15eeb481a7cc2038ce54d552b9b791e7bee78145241
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
5KB
MD514f2d3462c50860140c950334d65f26b
SHA1240bb3e4a9d37a20bbf93f07d122ae2f258a98d9
SHA256acead62aad2ca16d2ce78f3b270510fb1ce4e50b2db4646545afb5f8db19848b
SHA51271dbc98a043eddf28407d60c14c5271704be0be71ade3c6c78b0b4cd0ae43fd6f9758beef7691d79e3aa082147a1c920ecb9e353765892cd0f9c7a7a0f75f02d
-
Filesize
5KB
MD5dc3eedf937fa18f0a310e6b3edf219c3
SHA1615318f35f83a7febf35bd3f81211f78370344b2
SHA2560fc5c2d3c65e0d6c899349029a87a1e2f4c67608e6e84edc0fafc6cd8643c43a
SHA51227f4148533a112dbba27b496d768089da94c11153c612aa542a4105f9452ef934312f4b78a4e7b9816a2e8df688da6648f9c353b3dffa81c147fe170d55de96d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5511cea64b68d60983d20dd080d69db2a
SHA1ff845f92a8dbce8bcf118c0bc0dd0f6ebf448ee8
SHA2563e9c0bad6e1571ff50eeeb1320479355f318916fb3770feff4e95181b7ed1627
SHA5122514eca510a211e97c2228719232192bf52ffe34b78c49039a3aa42682059df4f40ffab7552bcaa942536ec0e369775f2813163119cf5fc6bc0423ddfb235305
-
Filesize
11KB
MD59a8619bafa735f3ccce5915c1724c0c9
SHA1910497250f118b76e717a3bf001ce456b9f496e1
SHA256e3e1999e51413b33a4c3e0d1bf3e33c8f98bd30915397dfe18df4543439bd5ee
SHA512bb8997a9881ee75028809ff52d9f2c769d9409e8fe16a9d4a7447d34bb3c1e5751c742ebcd63edeff7123ac1864ded7583d75db842d10736aacaf11133df3a85