Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
19/03/2024, 16:46
240319-t968vagg74 1019/03/2024, 16:44
240319-t811fahe2x 1019/03/2024, 16:41
240319-t68x9sgf77 10Analysis
-
max time kernel
136s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 16:46
Behavioral task
behavioral1
Sample
silence/silence-workspace.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
silence/silence-workspace.exe
Resource
win10v2004-20240226-en
General
-
Target
silence/silence-workspace.exe
-
Size
1.7MB
-
MD5
839a13e8b65aab0cb6d061ac82a8e3d4
-
SHA1
3de9d9d68c94493867bcb081d093bf39d45bf923
-
SHA256
a8741e78c8b8b86042814e65b5a7ab358f1050757de3738a0d358097db996bd3
-
SHA512
ea2ded5b24dc88af32673957a7cc85c5b602fec5731c4af4d3cb9859009f0af6d2b9b629253090d23715af3b8030fc5727612f92a5339e08748fad5694eff2bc
-
SSDEEP
49152:O0xx0GTBlPBAc2AVMlsHbeucMYc5pSoUiGG8:OWTkcH3Hyo
Malware Config
Extracted
discordrat
-
discord_token
MTIwODA5NTM2NDk2MDM1NDM3NA.GizXN5._a-pu5nHBPQiBTo-MibYQvf7mDtkutfsttwhUo
-
server_id
1208095629734322196
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation silence-workspace.exe -
Executes dropped EXE 2 IoCs
pid Process 1976 CLIENT-BUILT.EXE 1860 SILENCE-WORKSPACE.EXE -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 33 discord.com 34 discord.com 52 discord.com 61 discord.com 62 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1976 CLIENT-BUILT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4368 wrote to memory of 1976 4368 silence-workspace.exe 91 PID 4368 wrote to memory of 1976 4368 silence-workspace.exe 91 PID 4368 wrote to memory of 1860 4368 silence-workspace.exe 92 PID 4368 wrote to memory of 1860 4368 silence-workspace.exe 92 PID 1860 wrote to memory of 1212 1860 SILENCE-WORKSPACE.EXE 94 PID 1860 wrote to memory of 1212 1860 SILENCE-WORKSPACE.EXE 94 PID 1212 wrote to memory of 316 1212 cmd.exe 96 PID 1212 wrote to memory of 316 1212 cmd.exe 96 PID 1212 wrote to memory of 4924 1212 cmd.exe 97 PID 1212 wrote to memory of 4924 1212 cmd.exe 97 PID 1212 wrote to memory of 1408 1212 cmd.exe 98 PID 1212 wrote to memory of 1408 1212 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE"C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD5 | find /i /v "md5" | find /i /v "certutil"3⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD54⤵PID:316
-
-
C:\Windows\system32\find.exefind /i /v "md5"4⤵PID:4924
-
-
C:\Windows\system32\find.exefind /i /v "certutil"4⤵PID:1408
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD56f9c42f940f854243a2f445c8cb750ec
SHA1aeed75218753dd1f184cc55ebbe8a1a80e5a59f3
SHA25615fbe5942c60d92081fa93d5444a7abb355dc917c9ea3a44585d5a4b4219e91a
SHA512612bfac0a8a079a67e361e87ac6eaf9c9cc5a4940b5dd74ecb6c61e2811707b2e60e60ee70102622c0bb222b01a3aced82853d130d2f07075e8d629e33bb8cb2
-
Filesize
1.6MB
MD58b393057c5c9026495f8efbe7234b1c4
SHA121aff93ce1ff29a961ac947cafd75b6994fb5ae8
SHA256c100648181026be6dbce91beb36b5cd859563c4b0edd8e4a0aa5d60829467b30
SHA51257504769cff622817a129f4b0d235d2f148a381d588950949f0b0316c71aef46e3d0d17747a50a81a946e73af486962d52f23160fe937c1d6caf8db4b1996952