Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
294s -
max time network
300s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
26/03/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
ForniteCheatUD.rar
Resource
win11-20240221-en
General
-
Target
ForniteCheatUD.rar
-
Size
9KB
-
MD5
9684baf24c8244b66fd147dffd1176ec
-
SHA1
6353430a8f0e267362f867766224ab0073056b02
-
SHA256
4d68fb781aec96b4f0b625addf2b27b8179a3cdf01b68597aaef0e4b178d14f7
-
SHA512
3f98eceb28efa678874c7cdf06c2948d95449ea57427e5dfdb3e37e2ca677d69f88fb7177223606cd3b156216389c3ae8d91133626f1ca787429f8ed29be85d7
-
SSDEEP
192:9eshE7h204ptFHNy+vY654kUjbpjXNGSWXYQnEY0u6FQSAfYlEcHuhwM2J:9ePOpdy+vH5IbTK1TNgl62M2J
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 780 ForniteCheatUD.exe 2896 ForniteCheatUD.exe 1732 ForniteCheatUD.exe 4388 ForniteCheatUD.exe 2916 ForniteCheatUD.exe 3416 ForniteCheatUD.exe 3640 ForniteCheatUD.exe 5112 ForniteCheatUD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-2930051783-2551506282-3430162621-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2844 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2844 7zFM.exe Token: 35 2844 7zFM.exe Token: SeSecurityPrivilege 2844 7zFM.exe Token: SeSecurityPrivilege 2844 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2844 7zFM.exe 2844 7zFM.exe 2844 7zFM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4564 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2844 2848 cmd.exe 79 PID 2848 wrote to memory of 2844 2848 cmd.exe 79
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\ForniteCheatUD.rar1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ForniteCheatUD.rar"2⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2844
-
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:780
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:2896
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4564
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:1732
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:4388
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:2916
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:3416
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:3640
-
C:\Users\Admin\Desktop\ForniteCheatUD.exe"C:\Users\Admin\Desktop\ForniteCheatUD.exe"1⤵
- Executes dropped EXE
PID:5112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD594aaadf8fa4c31d238b961fcb2a519d5
SHA1608175ecf723861c59796d3989fee3dfdf3bb6d2
SHA256744cf26c0641b62c0daa1d5508613d6f1417778c242d3d79220121f70f9515b5
SHA512574d80ffabd249da41a8c4618123aa2e88595cf3ac55b9e3e4c2dd2a3c2cee52c954119f5ed54d36941da78a4bc1963cdaa7dfdd4f19d3c1e954ced86deafecf
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5eebfb84605e05222e3ad98f4b9f62db2
SHA136ddd440df5b2776281ad245a6a57e7a183c09a0
SHA2564a9b70f7113d5c252937ad9bbfa110031124ffe3643648db3f944111b61bd559
SHA51290e6f46d36c30783af4032f72beb58eb157849a8197e39945542da8a0c1313cb87e91f18a732f5718ec6a676fcd790458419bcc22c608824416fa6df14bf5ba6
-
Filesize
20KB
MD5c728c2a864887a9b6e60c689a666fd21
SHA10b2727fb5357e65f30061a4b2bbcbb7233222ee2
SHA25658203dfd57f20ed4ab12cd2432588bc00803c062c4cd48bae3f14c06fa862f61
SHA512bbf1309b45c05b3129ebb090efb13ff3fd3c883508224ece71339c51bd5e276c528474b131522d1c42dd4ba05cab773f21b748a01b64ba2deb804e48a0905e47