Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
04/12/2024, 20:25
241204-y7kz2szkc1 10Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/12/2024, 20:25
Behavioral task
behavioral1
Sample
UdFortniteCheat.exe
Resource
win7-20240903-en
General
-
Target
UdFortniteCheat.exe
-
Size
45KB
-
MD5
4f4a8f5848aa78ac7aa1fef6ca2e500c
-
SHA1
ae4111ea85f9eb3c8c21d496b87b857cc7fd25ea
-
SHA256
0ffb34993a5b11563fe9df89c9fcd267d804f6d87130192c12dca02cf4b11a55
-
SHA512
ba93e1820b00ab4c0194f0148868fd2224187d8e4ae17d08341ad19013425240bc5d6f1ebb274870f6a1211a40766b4ac7b7470496f77216dc6d06e5305adde0
-
SSDEEP
768:edhO/poiiUcjlJInpFH9Xqk5nWEZ5SbTDakWI7CPW5D:ow+jjgn3H9XqcnW85SbTFWIr
Malware Config
Extracted
xenorat
127.0.0.1
Fn Cfo
-
delay
5000
-
install_path
nothingset
-
port
4444
-
startup_name
needed for fortnite
Signatures
-
Detect XenoRat Payload 1 IoCs
resource yara_rule behavioral1/memory/1288-1-0x0000000000930000-0x0000000000942000-memory.dmp family_xenorat -
Xenorat family
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UdFortniteCheat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1948 schtasks.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1288 wrote to memory of 1948 1288 UdFortniteCheat.exe 31 PID 1288 wrote to memory of 1948 1288 UdFortniteCheat.exe 31 PID 1288 wrote to memory of 1948 1288 UdFortniteCheat.exe 31 PID 1288 wrote to memory of 1948 1288 UdFortniteCheat.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\UdFortniteCheat.exe"C:\Users\Admin\AppData\Local\Temp\UdFortniteCheat.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "needed for fortnite" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD74C.tmp" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1948
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb18ade1d167d6918f86eb5ca6484e05
SHA183912669ef7a3e55b978a7d44e24e8575440f1c7
SHA256ca2c02c3e66ba3405176b8d3f1ee705ea6130eb8f899214523cb2bb13864f1d4
SHA51250747e23674ff6c561ab39a2a50b192f3c185a9ba45e1a68c0d6f2382d0ed1f265028e16d9fc6290da4ee5544c77f0518af43a2efc18efb574ec24a9a7b5f96b