Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
03/01/2024, 08:44
240103-knm4eacdcm 303/01/2024, 08:42
240103-kl956afaf7 1003/01/2024, 08:35
240103-khc19acdbm 10Analysis
-
max time kernel
27s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
hehegnp.scr
Resource
win7-20231215-en
General
-
Target
hehegnp.scr
-
Size
1.3MB
-
MD5
a34f34fb4c3b4c36b3b81f97cdcb7ca3
-
SHA1
b56023dc51011bec0e91e54c9729f6e633a08867
-
SHA256
47680c12b9b928ff642864694790d799cd419668c4c96bdb58b1ae2818dbb574
-
SHA512
dfda79a26f6e419b07920efc27e5b8c40de4ca2a2d839c675c99cc8eb9bbb2b98b80729ecf36e3ef7fa247b41f51e8193e6cd874fe08418272a50d34d9a95cce
-
SSDEEP
24576:BNA3R5drX46t/YOd4prFamZa3wtdnJJ9NHuFkZhSq/JvU21wVcj2F76aP2GZ39wf:k546dbChJg3wtxz99ueZhSqtU2eVm2J0
Malware Config
Extracted
discordrat
-
discord_token
MTE5MTk5ODM3NTg4OTk5Mzc4MA.G8Z16P.3jjREwtvwZBkdqbzBAXhIsaJmyZEYrq_haoKWM
-
server_id
1060150467436499004
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2648 nitro.exe -
Loads dropped DLL 6 IoCs
pid Process 2116 hehegnp.scr 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2716 DllHost.exe 2716 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2648 2116 hehegnp.scr 29 PID 2116 wrote to memory of 2648 2116 hehegnp.scr 29 PID 2116 wrote to memory of 2648 2116 hehegnp.scr 29 PID 2116 wrote to memory of 2648 2116 hehegnp.scr 29 PID 2648 wrote to memory of 2572 2648 nitro.exe 30 PID 2648 wrote to memory of 2572 2648 nitro.exe 30 PID 2648 wrote to memory of 2572 2648 nitro.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\hehegnp.scr"C:\Users\Admin\AppData\Local\Temp\hehegnp.scr" /S1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\nitro.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\nitro.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2648 -s 5963⤵
- Loads dropped DLL
PID:2572
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
605KB
MD5ebaa6cde0388c8264a56da1313c19b87
SHA1c410f28de4546f69ccd622c805d4f7a268aedae8
SHA256ffd73b49ff04017ad122bc4d7a4886cb3320a3e63778e54066bba686a635c729
SHA512a356b9354198aa413621ee9fe9ce9366de10cacbd3842b7aa77aa81f4d03f115aedce6ab454baad90aa0773fa19c1c0203d06531aa68c06ce936f126b60dcefa
-
Filesize
78KB
MD5b276f6c9a652197f36c8ef95441b4840
SHA15ccfb78de6c40fce8145fa5725176d0c556d22a7
SHA2567036bea5264e75b932fa942f337ad028e22bbd8e7bdfd9cad10241538aa07d60
SHA5127c4ae8c8aab416a56974fcfba1bc09dd84a1c43a26bf5d74cbf667ea86827d2949006e74f9e16eba2a67a52af47e4972f7c2a5f681f407e0af6e67998aecf209