Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2024, 18:26

General

  • Target

    Z1ON Dot Net Obfuscator v2.exe

  • Size

    833KB

  • MD5

    583db42843ecdb4f5ba790beb43572a4

  • SHA1

    a55fc37ba004e327fd9444489ac19789bfe267c5

  • SHA256

    b1f32da53c09893e50094325682f61d0b6e662ab7d1df628dd5167d25b7a7c67

  • SHA512

    98dd5a4b63c6e69d084fbf31a5e48a61050be94f8e8613048fcd056cb1960deeed565c891066d6e9b4114166335a6ecfe5cfdc746955dfa589f89db14df82faa

  • SSDEEP

    12288:HCwqF4Ef4tYimS7hD/4onsU9hCqdTsGyFdfJ:iB4m4tcuD/4osU9hCWsDb

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIxMzkyOTAxNDQ4MjQzNjE2Nw.G9M0hN.nD-_EEbklL8mO6w0EeRslibB6lcsoMD5XbbFRo

  • server_id

    1209523015184818257

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator v2.exe
    "C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator v2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3744
    • C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator.exe
      "C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator.exe"
      2⤵
      • Executes dropped EXE
      PID:3972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 1060
        3⤵
        • Program crash
        PID:2764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3972 -ip 3972
    1⤵
      PID:5052

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Client-built.exe

      Filesize

      78KB

      MD5

      cc9f95bc616eaa9f2e7b6318eac6ef60

      SHA1

      60f6705dad7f26f6284006f29f7fb64b9075fed1

      SHA256

      e9157690a3c1cab1d44afaabbdceb26679f5a02202f185ad854f6264a23a7c31

      SHA512

      abf98ac5e492d56808b10111c9663a59251c0a0c61396b6d49307bce3357e6585c0da7f20f78707846f18af1fa5bccb4d9d91b4778140b583ae64462d770f668

    • C:\Users\Admin\AppData\Local\Temp\Z1ON Dot Net Obfuscator.exe

      Filesize

      1023KB

      MD5

      c7fa9a7d9b0d2cdb6742477158b190f8

      SHA1

      44258c848294d209c6504640f9c785241485fc28

      SHA256

      08aa03c784c192aa76acc4da4f79eca7a86e769e405e33c4bff9b0246989af74

      SHA512

      2f0b2af4400a16abf365fcc122ae92e6a6ebcd0aa5ce77a7601e27f219dd03132eb47ad9a84916028e3dd0eb228000652ad8f3059f6e717fa22c4049c9ec5540

    • memory/2664-29-0x00007FFD05130000-0x00007FFD05BF1000-memory.dmp

      Filesize

      10.8MB

    • memory/2664-1-0x00007FFD05130000-0x00007FFD05BF1000-memory.dmp

      Filesize

      10.8MB

    • memory/2664-2-0x000000001B3B0000-0x000000001B3C0000-memory.dmp

      Filesize

      64KB

    • memory/2664-0-0x00000000005A0000-0x0000000000676000-memory.dmp

      Filesize

      856KB

    • memory/3744-32-0x000002237F920000-0x000002237F930000-memory.dmp

      Filesize

      64KB

    • memory/3744-28-0x00007FFD05130000-0x00007FFD05BF1000-memory.dmp

      Filesize

      10.8MB

    • memory/3744-26-0x000002237F940000-0x000002237FB02000-memory.dmp

      Filesize

      1.8MB

    • memory/3744-40-0x000002237F920000-0x000002237F930000-memory.dmp

      Filesize

      64KB

    • memory/3744-17-0x00000223652B0000-0x00000223652C8000-memory.dmp

      Filesize

      96KB

    • memory/3744-39-0x00007FFD05130000-0x00007FFD05BF1000-memory.dmp

      Filesize

      10.8MB

    • memory/3744-36-0x0000022300530000-0x0000022300A58000-memory.dmp

      Filesize

      5.2MB

    • memory/3972-35-0x0000000005B00000-0x0000000005B92000-memory.dmp

      Filesize

      584KB

    • memory/3972-34-0x0000000006010000-0x00000000065B4000-memory.dmp

      Filesize

      5.6MB

    • memory/3972-33-0x0000000005980000-0x0000000005A5C000-memory.dmp

      Filesize

      880KB

    • memory/3972-37-0x0000000005CA0000-0x0000000005CAA000-memory.dmp

      Filesize

      40KB

    • memory/3972-38-0x0000000075320000-0x0000000075AD0000-memory.dmp

      Filesize

      7.7MB

    • memory/3972-30-0x0000000000F40000-0x0000000001044000-memory.dmp

      Filesize

      1.0MB

    • memory/3972-31-0x0000000075320000-0x0000000075AD0000-memory.dmp

      Filesize

      7.7MB