Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    10/05/2024, 03:43

General

  • Target

    1blScenical_20K_-_16x.piz.exe

  • Size

    523KB

  • MD5

    64a2c79e246b7146369116c889f213f9

  • SHA1

    7444066ee8820f3f8ad0829cd33304c9e0c79b8f

  • SHA256

    2e771dba0b3a759cfe36f121d6cbdbad4df8017bf0727166fe8e32c9629b4a25

  • SHA512

    bf8dfe69c8d806d00fac528521a6d92580646aa55a7f3d374cd72c4409712014c425493e4d8cbb7e4c08172745ec5f054d9895f7bac5014765b36af56ef21a84

  • SSDEEP

    12288:nCQjgAtAHM+vetZxF5EWry8AJGy0+6Bd3X3uSN3mQ:n5ZWs+OZVEWry8AFwBd3X3JNWQ

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNzM5MzAyNjUyODMxNzQ2MA.G0y1Xb.9o_1Ees0G6RNPvIZ60KfHPTQzAoIqKeZUfoAhc

  • server_id

    1237392946488410233

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1blScenical_20K_-_16x.piz.exe
    "C:\Users\Admin\AppData\Local\Temp\1blScenical_20K_-_16x.piz.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1660
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1660 -s 596
        3⤵
        • Loads dropped DLL
        PID:2128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    255d307efe297278a0f5c8d54091a959

    SHA1

    b61e214229d6c2192f61610d1a843f547d941c16

    SHA256

    174440c48b60ba3b22ab706cc4dca25d41a6aaae5f88cbfa8ea5283f3c8e0516

    SHA512

    087d8f5ccf9af3681110c50bd47d587f6a510d441cfa9821777d250d7458a2d8cdba9286fd10117cb763a23c43cb1bb252abbf8cc2e00ae0d880f6f88098c4aa

  • memory/1244-2-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/1244-17-0x00000000020D0000-0x00000000020D1000-memory.dmp

    Filesize

    4KB

  • memory/1660-9-0x000007FEF6093000-0x000007FEF6094000-memory.dmp

    Filesize

    4KB

  • memory/1660-10-0x000000013F960000-0x000000013F978000-memory.dmp

    Filesize

    96KB

  • memory/1660-15-0x000007FEF6090000-0x000007FEF6A7C000-memory.dmp

    Filesize

    9.9MB

  • memory/1660-18-0x000007FEF6093000-0x000007FEF6094000-memory.dmp

    Filesize

    4KB

  • memory/1660-19-0x000007FEF6090000-0x000007FEF6A7C000-memory.dmp

    Filesize

    9.9MB