Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/07/2023, 08:06

230703-jzrqasfe76 1

02/07/2023, 20:45

230702-zj1w2adf44 1

Analysis

  • max time kernel
    286s
  • max time network
    247s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-en
  • resource tags

    arch:x64arch:x86image:win10-20230621-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/07/2023, 08:06

General

  • Target

    https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 45 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://github.com/moom825/Discord-RAT-2.0/releases/download/2.0/release.zip
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2124 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2464
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4776
    • C:\Users\Admin\Desktop\Release\Discord rat.exe
      "C:\Users\Admin\Desktop\Release\Discord rat.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4748
    • C:\Users\Admin\Desktop\Release\Discord rat.exe
      "C:\Users\Admin\Desktop\Release\Discord rat.exe"
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4300

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      471B

      MD5

      6fe591eda8a5298312a36630f5e00de9

      SHA1

      e33454cdb04272145c12bc17c9f0edf9aa5e6633

      SHA256

      6b792fbfd134e94e30d56b9ca265385b70f4665b710868d1f703061a7925a762

      SHA512

      dee9cb5120a18ae3e9855df3994cdf9d0f93162c659e8d331c766be5e67ea75dd051b7bfa399aca286cfa2a1544feb99e13643c1f4fedf178698111a87f9aed4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

      Filesize

      404B

      MD5

      a1381109d9223cd0da605821f4df2e1e

      SHA1

      53edaf5281098abc550e3a6d0c1c303f93269778

      SHA256

      ddafd7324e5c3ea31e11f8482a3a49ab7598b0c58c7cde3f17a4e671ae37f34b

      SHA512

      0767a33eb7dbc386075bd6680a68d5f067d26cbd4d7f732d26ac62c36df5a82b133f7e36e967e37911e404ff613188c5da73fd91607af462d1d386f203797e14

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DomainSuggestions\en-US.1

      Filesize

      17KB

      MD5

      5a34cb996293fde2cb7a4ac89587393a

      SHA1

      3c96c993500690d1a77873cd62bc639b3a10653f

      SHA256

      c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

      SHA512

      e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\P3DC16NS\release.zip.f8k88ho.partial

      Filesize

      445KB

      MD5

      06a4fcd5eb3a39d7f50a0709de9900db

      SHA1

      50d089e915f69313a5187569cda4e6dec2d55ca7

      SHA256

      c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97

      SHA512

      75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\XGKDZR89\release[1].zip

      Filesize

      445KB

      MD5

      06a4fcd5eb3a39d7f50a0709de9900db

      SHA1

      50d089e915f69313a5187569cda4e6dec2d55ca7

      SHA256

      c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97

      SHA512

      75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\IDSXGOZD.cookie

      Filesize

      609B

      MD5

      be18524a309c8ad37d42121208b2aa24

      SHA1

      f3a3cbd82919f0387f71d8caedf0585336e9fa34

      SHA256

      732f5db857e652d98b4320cb1f589c6b75349bc2e9248713ce4ac69725906c35

      SHA512

      49066b68ecda82db851022ed5efc892b21af888531d80d618a865e7fb1cd141b3b0bc7a425ac988c025b43d6c09c7d01b1c705ea54533d849d6a1e03aef0de1a

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\XN0YB168.cookie

      Filesize

      608B

      MD5

      fbe27ac7d0a64f0c3504408769c8a017

      SHA1

      48c979aca00703f26d3b94172285cd958847495f

      SHA256

      0b10c17a86a44059493d468a5b75779bad6f6ffdf5c2c0bc6cf627cd8d33019b

      SHA512

      97bf01de1d54bdd5a9b7f2a634f5b62765aa4195fc124daac8677b85c8ff6fb10c855119bf9426fbed3d0a4d6cba904c88037b27810a7c41829b0f153938a2b5

    • memory/4300-190-0x000001C96A820000-0x000001C96A830000-memory.dmp

      Filesize

      64KB

    • memory/4300-191-0x000001C96A820000-0x000001C96A830000-memory.dmp

      Filesize

      64KB

    • memory/4748-185-0x000001D1D8600000-0x000001D1D8618000-memory.dmp

      Filesize

      96KB

    • memory/4748-186-0x000001D1F2C50000-0x000001D1F2E12000-memory.dmp

      Filesize

      1.8MB

    • memory/4748-187-0x000001D1DA380000-0x000001D1DA390000-memory.dmp

      Filesize

      64KB

    • memory/4748-188-0x000001D1F3350000-0x000001D1F3876000-memory.dmp

      Filesize

      5.1MB

    • memory/4748-189-0x000001D1DA380000-0x000001D1DA390000-memory.dmp

      Filesize

      64KB