Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04/04/2024, 11:44
Static task
static1
Behavioral task
behavioral1
Sample
reducer.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
reducer.exe
Resource
win10v2004-20240226-en
General
-
Target
reducer.exe
-
Size
29KB
-
MD5
113b4c92dca5eb03fef7916d9d3216be
-
SHA1
231a7949ef5eb2fadf148884742b40d32e71cdd7
-
SHA256
d01b49ea8c4f9215e0838147fb4eb5909c6298e9f1314e7401faf0d6cbc5d9e0
-
SHA512
fe348660ff1d08b937178466852c04042db6fa0ceda6981c7cdff726e6629741d1170bfee6be16c115a9df1d2a3177b985ade216a137d2f6f83fbd2ab199cd10
-
SSDEEP
768:KMLDTH3XaAy8MM9cmtqTbUh/W2pfAIxsXo:PHiS9cIhe2pI3o
Malware Config
Extracted
discordrat
-
discord_token
MTEyOTg3Mzk2MjY0MjQ2MDc3Mw.GVoB7q.zgQTyRC6__mUfWAQ71TKowd69RCw5b2gtOewvc
-
server_id
979482293682978877
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation reducer.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Reducer.exe reducer.exe -
Executes dropped EXE 1 IoCs
pid Process 884 Reducer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 40 raw.githubusercontent.com 41 raw.githubusercontent.com 46 discord.com 47 discord.com 51 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 884 Reducer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4252 wrote to memory of 884 4252 reducer.exe 98 PID 4252 wrote to memory of 884 4252 reducer.exe 98 PID 4252 wrote to memory of 1876 4252 reducer.exe 99 PID 4252 wrote to memory of 1876 4252 reducer.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\reducer.exe"C:\Users\Admin\AppData\Local\Temp\reducer.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\DriverFolder\Reducer.exe"C:\Users\Admin\AppData\Local\Temp\DriverFolder\Reducer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:1876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5a0ed18c4c55e30f18daea0a73d7fbaf2
SHA1a1fcf1341639f9866dbf6e5a159f189f1daa83b4
SHA256a9e915cdf40d63a220b00b2391859d240969293bb489d2c78b55273079793a15
SHA512034691a5765e9b601a18fc385c783ac5083b13f2bc84500adbab799eca2013467f0eaf23a87222113649a43488e890430491124de994569ab7f441b12640e070