Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/11/2024, 16:29 UTC

241113-tzhshaymdr 10

Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/11/2024, 16:29 UTC

General

  • Target

    FortniteSpoofer.exe

  • Size

    60.9MB

  • MD5

    af4d618c235ce2459d7e2d0fc79119b7

  • SHA1

    6644430c1276f7043869d834ae8c3b58c6cc6808

  • SHA256

    e5056d3c0b8374c07356a09194dde6bbf490bfdf31d094926473760b6da0ec39

  • SHA512

    edbdfbcad2b88a08bc79a598eac3a53060d3309c79944de80071a1f505540f1e29ecad361697a09488147e24d972dc6b95a6bcade631bd6759e1d4134eb38f33

  • SSDEEP

    1572864:xriI42qHWB75il/Z2CbuDzm5i/6afQtAhD40pXHM02OGOlHOOKnwJ:V42qHO5ilwnG0iWMstB2O1

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FortniteSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\FortniteSpoofer.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Users\Admin\AppData\Local\Temp\FortniteSpoofer.exe
      "C:\Users\Admin\AppData\Local\Temp\FortniteSpoofer.exe"
      2⤵
      • Loads dropped DLL
      PID:3456

Network

  • flag-us
    DNS
    13.86.106.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    13.86.106.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    20.160.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    20.160.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    58.55.71.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    58.55.71.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    53.210.109.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    53.210.109.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    206.23.85.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    206.23.85.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.134.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.134.221.88.in-addr.arpa
    IN PTR
    Response
    18.134.221.88.in-addr.arpa
    IN PTR
    a88-221-134-18deploystaticakamaitechnologiescom
  • flag-us
    DNS
    99.208.201.84.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    99.208.201.84.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    210.143.182.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    210.143.182.52.in-addr.arpa
    IN PTR
    Response
No results found
  • 8.8.8.8:53
    13.86.106.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    13.86.106.20.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    20.160.190.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    20.160.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    58.55.71.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    58.55.71.13.in-addr.arpa

  • 8.8.8.8:53
    53.210.109.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    53.210.109.20.in-addr.arpa

  • 8.8.8.8:53
    206.23.85.13.in-addr.arpa
    dns
    71 B
    145 B
    1
    1

    DNS Request

    206.23.85.13.in-addr.arpa

  • 8.8.8.8:53
    18.134.221.88.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    18.134.221.88.in-addr.arpa

  • 8.8.8.8:53
    99.208.201.84.in-addr.arpa
    dns
    72 B
    132 B
    1
    1

    DNS Request

    99.208.201.84.in-addr.arpa

  • 8.8.8.8:53
    210.143.182.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    210.143.182.52.in-addr.arpa

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\VCRUNTIME140.dll

    Filesize

    116KB

    MD5

    be8dbe2dc77ebe7f88f910c61aec691a

    SHA1

    a19f08bb2b1c1de5bb61daf9f2304531321e0e40

    SHA256

    4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

    SHA512

    0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_asyncio.pyd

    Filesize

    63KB

    MD5

    07a6e6dcc30e1c4c7e0cdc41a457a887

    SHA1

    53bc820b63d88cbe889944e242b50662b4b2cb42

    SHA256

    746bc8fa88282afe19dc60e426cc0a75bea3bd137cca06a0b57a30bd31459403

    SHA512

    837f1e40db9bdf1bc73b2a700df6086a3acdb7d52afc903239410b2d226ffd1dd5e8b5f317401bcf58dd042bd56787af6cdc49af96fcb588bcf0127d536b6c6d

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_bz2.pyd

    Filesize

    82KB

    MD5

    aa1083bde6d21cabfc630a18f51b1926

    SHA1

    e40e61dba19301817a48fd66ceeaade79a934389

    SHA256

    00b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3

    SHA512

    2df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_ctypes.pyd

    Filesize

    121KB

    MD5

    565d011ce1cee4d48e722c7421300090

    SHA1

    9dc300e04e5e0075de4c0205be2e8aae2064ae19

    SHA256

    c148292328f0aab7863af82f54f613961e7cb95b7215f7a81cafaf45bd4c42b7

    SHA512

    5af370884b5f82903fd93b566791a22e5b0cded7f743e6524880ea0c41ee73037b71df0be9f07d3224c733b076bec3be756e7e77f9e7ed5c2dd9505f35b0e4f5

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_decimal.pyd

    Filesize

    249KB

    MD5

    c88282908ba54510eda3887c488198eb

    SHA1

    94ed1b44f99642b689f5f3824d2e490252936899

    SHA256

    980a63f2b39cf16910f44384398e25f24482346a482addb00de42555b17d4278

    SHA512

    312b081a90a275465787a539e48412d07f1a4c32bab0f3aa024e6e3fe534ac9c07595238d51dc4d6f13c8d03c2441f788dff9fe3d7ca2aad3940609501d273bd

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_elementtree.pyd

    Filesize

    125KB

    MD5

    e31fd445c65aec18c32a99828732264a

    SHA1

    1e7e9505954b8143faeee6ce0b459712f73018b1

    SHA256

    02e30b6a2bee5be5336e40a9c89575603051bde86f9c9cdc78b7fa7d9b7bd1f0

    SHA512

    20802cae1b75f28a83e76b529caf16c8d00bc050e66f6d8665c4238c4579e391c78f121dccb369f64511fdf892619720f8c626a39a28c9aa44f2bff7472cf0f9

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_hashlib.pyd

    Filesize

    63KB

    MD5

    b4ff25b1aca23d48897fc616e102e9b6

    SHA1

    8295ee478191eb5f741a5f6a3f4ab4576ceec8d2

    SHA256

    87dd0c858620287454fd6d31d52b6a48eddbb2a08e09e8b2d9fdb0b92200d766

    SHA512

    a7adcf652bc88f8878dae2742a37af75599936d80223e62fe74755d6bafaafd985678595872fb696c715f69a1f963f12e3d52cd3d7e7a83747983b2ee244e8a2

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_lzma.pyd

    Filesize

    155KB

    MD5

    b86b9f292af12006187ebe6c606a377d

    SHA1

    604224e12514c21ab6db4c285365b0996c7f2139

    SHA256

    f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5

    SHA512

    d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_multiprocessing.pyd

    Filesize

    33KB

    MD5

    cf0b31f01a95e9f181d87197786b96ca

    SHA1

    6214361452f7eaef5c710719a5cfb6109906975c

    SHA256

    975c1947798e3c39898c86675ca1eb68249f77361f41f172f9800275227213b9

    SHA512

    d56b096780bb263e3f7282f163da02353ed5d8767f964937deaff997156e95749312180f25582d5963d3c351260b8ff196221652e7bf088a8c6a4e766118abd3

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_overlapped.pyd

    Filesize

    50KB

    MD5

    78e8049e26df6fd3a4011562ff8e74a0

    SHA1

    d5a91c720e4672c40e1dd6d54b3197b4a1f8b633

    SHA256

    ca106e4dfdeafeabf9e98956d3d8d0cb73e109f1a96f1a7e35bc47dbd7c7e164

    SHA512

    ea7a54d38cefed870cee65dd9460b6c51131ae5219933ddc998a86d12bb093784242cb5471c77bc324ccf59fa42c2914865dcf582f74c440fa52b7d15d9faeac

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_queue.pyd

    Filesize

    31KB

    MD5

    7f52ef40b083f34fd5e723e97b13382f

    SHA1

    626d47df812738f28bc87c7667344b92847fdf6a

    SHA256

    3f8e7e6aa13b417acc78b63434fb1144e6319a010a9fc376c54d6e69b638fe4c

    SHA512

    48f7723a8c039abd6ccb2906fbd310f0cfa170dcbdf89a6437dd02c8f77f20e6c7c402d29b922cdaabd357d3a33e34c3ad826127134f38d77a4d6d9c83371949

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_socket.pyd

    Filesize

    77KB

    MD5

    b77017baa2004833ef3847a3a3141280

    SHA1

    39666f74bd076015b376fc81250dff89dff4b0a6

    SHA256

    a19e3c7c03ef1b5625790b1c9c42594909311ab6df540fbf43c6aa93300ab166

    SHA512

    6b24d0e038c433b995bd05de7c8fe7dd7b0a11152937c189b8854c95780b0220a9435de0db7ac796a7de11a59c61d56b1aef9a8dbaba62d02325122ceb8b003d

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_sqlite3.pyd

    Filesize

    117KB

    MD5

    68d89aaab48b82a7d76fb65e9c613a24

    SHA1

    b872497ebe4aba49025c9f836f4b2a3f1f033e5e

    SHA256

    ff6a2a2f38b21b7784f97d604c99961d8c07ef455f7908110a4e893835d42b76

    SHA512

    5eec9169ab29c291010f0e171c3123552d8c68e943a615dc2f8e1ae75f809a54343572737279d9582b585997ed390af856f551dadeada85ae2f1aa908fc9b39c

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\_ssl.pyd

    Filesize

    174KB

    MD5

    0f02eccd7933b7a7c2bdedca2a72aab6

    SHA1

    0b4c551d8fe34d8128e5cf97daa19eb4c97db06e

    SHA256

    ba5388d6a6557d431e086734a3323621dc447f63ba299b0a815e5837cf869678

    SHA512

    90a64082dab51380e05c76047ee40e259c719d7170fb4acb247b68a03b710461b350da3821b426fd13167895ded32f9c5ec0e07587ad4125683a18a3495f5ed5

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\base_library.zip

    Filesize

    1.4MB

    MD5

    add95481a8e9d5743eee394036ca4914

    SHA1

    eab5d38e7fa33ae86452e6609ed8afed21516969

    SHA256

    396171544049d4554472e78cb41f873f7d8951d7450685f364d4487d09b98ad8

    SHA512

    161b64229f676d1894954bef08fbc0cacc9a5aff5cbf607918f919aa7065e9b5edbaed7057d0113eec24c688b60e7dcd0aa8610105ab350c6c5c30e0f5e6db1a

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\crypto_clipper.json

    Filesize

    155B

    MD5

    8bff94a9573315a9d1820d9bb710d97f

    SHA1

    e69a43d343794524b771d0a07fd4cb263e5464d5

    SHA256

    3f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7

    SHA512

    d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\libcrypto-3.dll

    Filesize

    5.0MB

    MD5

    e547cf6d296a88f5b1c352c116df7c0c

    SHA1

    cafa14e0367f7c13ad140fd556f10f320a039783

    SHA256

    05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

    SHA512

    9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\libffi-8.dll

    Filesize

    38KB

    MD5

    0f8e4992ca92baaf54cc0b43aaccce21

    SHA1

    c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

    SHA256

    eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

    SHA512

    6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\libopus-0.x64.dll

    Filesize

    431KB

    MD5

    0e078e75ab375a38f99245b3fefa384a

    SHA1

    b4c2fda3d4d72c3e3294beb8aa164887637ca22a

    SHA256

    c84da836e8d92421ac305842cfe5a724898ed09d340d46b129e210bdc9448131

    SHA512

    fa838dab0a8a07ee7c370dd617073a5f795838c3518a6f79ee17d5ebc48b78cebd680e9c8cbe54f912ceb0ae6112147fb40182bcfdcc194b73aa6bab21427bfd

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\libssl-3.dll

    Filesize

    768KB

    MD5

    19a2aba25456181d5fb572d88ac0e73e

    SHA1

    656ca8cdfc9c3a6379536e2027e93408851483db

    SHA256

    2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006

    SHA512

    df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\pyexpat.pyd

    Filesize

    194KB

    MD5

    79561bc9f70383f8ae073802a321adfb

    SHA1

    5f378f47888e5092598c20c56827419d9f480fa7

    SHA256

    c7c7564f7f874fb660a46384980a2cf28bc3e245ca83628a197ccf861eab5560

    SHA512

    476c839f544b730c5b133e2ae08112144cac07b6dfb8332535058f5cbf54ce7ed4a72efb38e6d56007ae755694b05e81e247d0a10210c993376484a057f2217c

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\python311.dll

    Filesize

    5.5MB

    MD5

    387bb2c1e40bde1517f06b46313766be

    SHA1

    601f83ef61c7699652dec17edd5a45d6c20786c4

    SHA256

    0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364

    SHA512

    521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\select.pyd

    Filesize

    29KB

    MD5

    e4ab524f78a4cf31099b43b35d2faec3

    SHA1

    a9702669ef49b3a043ca5550383826d075167291

    SHA256

    bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90

    SHA512

    5fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\sqlite3.dll

    Filesize

    1.5MB

    MD5

    89c2845bd090082406649f337c0cca62

    SHA1

    956736454f9c9e1e3d629c87d2c330f0a4443ae9

    SHA256

    314bba62f4a1628b986afc94c09dc29cdaf08210eae469440fbf46bcdb86d3fd

    SHA512

    1c467a7a3d325f0febb0c6a7f8f7ce49e4f9e3c4514e613352ef7705a338be5e448c351a47da2fb80bf5fc3d37dbd69e31c935e7ff58ead06b2155a893728a82

  • C:\Users\Admin\AppData\Local\Temp\_MEI33562\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    fd9132f966ee6d214e0076bf0492fb30

    SHA1

    89b95957f002bf382435d015e26962a42032cb97

    SHA256

    37c68617fa02a2cadced17ef724e2d450ef12a8a37215da789a4679fde1c5c02

    SHA512

    e35729abc45e5561aae1fb9e0e7c711dd7d3c1491520aa5c44fcc50c955f549f81d90897959327e930d02a5356afe08d6195adf002c87801a7a11235670639b5

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.