Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/03/2024, 16:46
240319-t968vagg74 1019/03/2024, 16:44
240319-t811fahe2x 1019/03/2024, 16:41
240319-t68x9sgf77 10Analysis
-
max time kernel
76s -
max time network
89s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
19/03/2024, 16:44
Behavioral task
behavioral1
Sample
silence/silence-workspace.exe
Resource
win10-20240221-en
General
-
Target
silence/silence-workspace.exe
-
Size
1.7MB
-
MD5
839a13e8b65aab0cb6d061ac82a8e3d4
-
SHA1
3de9d9d68c94493867bcb081d093bf39d45bf923
-
SHA256
a8741e78c8b8b86042814e65b5a7ab358f1050757de3738a0d358097db996bd3
-
SHA512
ea2ded5b24dc88af32673957a7cc85c5b602fec5731c4af4d3cb9859009f0af6d2b9b629253090d23715af3b8030fc5727612f92a5339e08748fad5694eff2bc
-
SSDEEP
49152:O0xx0GTBlPBAc2AVMlsHbeucMYc5pSoUiGG8:OWTkcH3Hyo
Malware Config
Extracted
discordrat
-
discord_token
MTIwODA5NTM2NDk2MDM1NDM3NA.GizXN5._a-pu5nHBPQiBTo-MibYQvf7mDtkutfsttwhUo
-
server_id
1208095629734322196
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 2 IoCs
pid Process 428 CLIENT-BUILT.EXE 4588 SILENCE-WORKSPACE.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 9 discord.com 10 discord.com 20 discord.com 28 discord.com 29 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 428 CLIENT-BUILT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4992 wrote to memory of 428 4992 silence-workspace.exe 71 PID 4992 wrote to memory of 428 4992 silence-workspace.exe 71 PID 4992 wrote to memory of 4588 4992 silence-workspace.exe 72 PID 4992 wrote to memory of 4588 4992 silence-workspace.exe 72 PID 4588 wrote to memory of 1320 4588 SILENCE-WORKSPACE.EXE 74 PID 4588 wrote to memory of 1320 4588 SILENCE-WORKSPACE.EXE 74 PID 1320 wrote to memory of 3728 1320 cmd.exe 75 PID 1320 wrote to memory of 3728 1320 cmd.exe 75 PID 1320 wrote to memory of 908 1320 cmd.exe 76 PID 1320 wrote to memory of 908 1320 cmd.exe 76 PID 1320 wrote to memory of 4916 1320 cmd.exe 77 PID 1320 wrote to memory of 4916 1320 cmd.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE"C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD5 | find /i /v "md5" | find /i /v "certutil"3⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD54⤵PID:3728
-
-
C:\Windows\system32\find.exefind /i /v "md5"4⤵PID:908
-
-
C:\Windows\system32\find.exefind /i /v "certutil"4⤵PID:4916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD56f9c42f940f854243a2f445c8cb750ec
SHA1aeed75218753dd1f184cc55ebbe8a1a80e5a59f3
SHA25615fbe5942c60d92081fa93d5444a7abb355dc917c9ea3a44585d5a4b4219e91a
SHA512612bfac0a8a079a67e361e87ac6eaf9c9cc5a4940b5dd74ecb6c61e2811707b2e60e60ee70102622c0bb222b01a3aced82853d130d2f07075e8d629e33bb8cb2
-
Filesize
1.6MB
MD58b393057c5c9026495f8efbe7234b1c4
SHA121aff93ce1ff29a961ac947cafd75b6994fb5ae8
SHA256c100648181026be6dbce91beb36b5cd859563c4b0edd8e4a0aa5d60829467b30
SHA51257504769cff622817a129f4b0d235d2f148a381d588950949f0b0316c71aef46e3d0d17747a50a81a946e73af486962d52f23160fe937c1d6caf8db4b1996952