Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
Exploiter/Exploiter.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Exploiter/Exploiter.exe
Resource
win10v2004-20240419-en
General
-
Target
Exploiter/Exploiter.exe
-
Size
447KB
-
MD5
1f45fbe95cf28a77d25bf115cc3002fe
-
SHA1
c1483030959bb50c1a3875b8202852bffee0913c
-
SHA256
514e6cb42b3b1431e89a415af7d0a98e51e4239be0c085a1730c996eef71cd9d
-
SHA512
f58574dd9efdf44bdb81adb3e6c1381a59c9afd1c7486359a8efb310e6d0e94511770288ac47cbafa80e2cb3467cb57e0c7a7e9fecc1e012dd643cf79df5d5b4
-
SSDEEP
12288:XCQjgAtAHM+vetZxF5EWry8AJGy0x4xLe4:X5ZWs+OZVEWry8AFtxe4
Malware Config
Extracted
discordrat
-
discord_token
MTIzNjMwNTc2MjU5NTI0MjA1NQ.G6VLak.4vdqf2Zl4iPZ7e-AyK9ykkGmr9LZPBhhchrbdY
-
server_id
1236306342461964380
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2664 Exploiter.exe -
Loads dropped DLL 6 IoCs
pid Process 2168 Exploiter.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2664 2168 Exploiter.exe 29 PID 2168 wrote to memory of 2664 2168 Exploiter.exe 29 PID 2168 wrote to memory of 2664 2168 Exploiter.exe 29 PID 2664 wrote to memory of 2968 2664 Exploiter.exe 30 PID 2664 wrote to memory of 2968 2664 Exploiter.exe 30 PID 2664 wrote to memory of 2968 2664 Exploiter.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Exploiter\Exploiter.exe"C:\Users\Admin\AppData\Local\Temp\Exploiter\Exploiter.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exploiter.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exploiter.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2664 -s 5963⤵
- Loads dropped DLL
PID:2968
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD578c524f335315f9a5d39c4f129431801
SHA198b113cbbca0b1a0fd500f2ebc05fa7456c46b2d
SHA2563d44765f108d3a39af671642d57da473b66c668830e0cd1488478c749fb47520
SHA512c7e304ba344ad96fde2782fa232a30f92cb4c638153282ed5d0adc3c1d26a8331dca4d7737b79c3fafbc73cb5524b9282f063c852458d8a81e5c681eb90dcc12