Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2024, 18:26
Static task
static1
Behavioral task
behavioral1
Sample
Z1ON Dot Net Obfuscator v2.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Z1ON Dot Net Obfuscator v2.exe
Resource
win10v2004-20240226-en
General
-
Target
Z1ON Dot Net Obfuscator v2.exe
-
Size
833KB
-
MD5
583db42843ecdb4f5ba790beb43572a4
-
SHA1
a55fc37ba004e327fd9444489ac19789bfe267c5
-
SHA256
b1f32da53c09893e50094325682f61d0b6e662ab7d1df628dd5167d25b7a7c67
-
SHA512
98dd5a4b63c6e69d084fbf31a5e48a61050be94f8e8613048fcd056cb1960deeed565c891066d6e9b4114166335a6ecfe5cfdc746955dfa589f89db14df82faa
-
SSDEEP
12288:HCwqF4Ef4tYimS7hD/4onsU9hCqdTsGyFdfJ:iB4m4tcuD/4osU9hCWsDb
Malware Config
Extracted
discordrat
-
discord_token
MTIxMzkyOTAxNDQ4MjQzNjE2Nw.G9M0hN.nD-_EEbklL8mO6w0EeRslibB6lcsoMD5XbbFRo
-
server_id
1209523015184818257
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation Z1ON Dot Net Obfuscator v2.exe -
Executes dropped EXE 2 IoCs
pid Process 3744 Client-built.exe 3972 Z1ON Dot Net Obfuscator.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 30 discord.com 32 discord.com 40 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2764 3972 WerFault.exe 93 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3744 Client-built.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3744 2664 Z1ON Dot Net Obfuscator v2.exe 92 PID 2664 wrote to memory of 3744 2664 Z1ON Dot Net Obfuscator v2.exe 92 PID 2664 wrote to memory of 3972 2664 Z1ON Dot Net Obfuscator v2.exe 93 PID 2664 wrote to memory of 3972 2664 Z1ON Dot Net Obfuscator v2.exe 93 PID 2664 wrote to memory of 3972 2664 Z1ON Dot Net Obfuscator v2.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator v2.exe"C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator v2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator.exe"C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator.exe"2⤵
- Executes dropped EXE
PID:3972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 10603⤵
- Program crash
PID:2764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3972 -ip 39721⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5cc9f95bc616eaa9f2e7b6318eac6ef60
SHA160f6705dad7f26f6284006f29f7fb64b9075fed1
SHA256e9157690a3c1cab1d44afaabbdceb26679f5a02202f185ad854f6264a23a7c31
SHA512abf98ac5e492d56808b10111c9663a59251c0a0c61396b6d49307bce3357e6585c0da7f20f78707846f18af1fa5bccb4d9d91b4778140b583ae64462d770f668
-
Filesize
1023KB
MD5c7fa9a7d9b0d2cdb6742477158b190f8
SHA144258c848294d209c6504640f9c785241485fc28
SHA25608aa03c784c192aa76acc4da4f79eca7a86e769e405e33c4bff9b0246989af74
SHA5122f0b2af4400a16abf365fcc122ae92e6a6ebcd0aa5ce77a7601e27f219dd03132eb47ad9a84916028e3dd0eb228000652ad8f3059f6e717fa22c4049c9ec5540