Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
1blScenical_20K_-_16x.piz.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1blScenical_20K_-_16x.piz.exe
Resource
win10v2004-20240426-en
General
-
Target
1blScenical_20K_-_16x.piz.exe
-
Size
523KB
-
MD5
64a2c79e246b7146369116c889f213f9
-
SHA1
7444066ee8820f3f8ad0829cd33304c9e0c79b8f
-
SHA256
2e771dba0b3a759cfe36f121d6cbdbad4df8017bf0727166fe8e32c9629b4a25
-
SHA512
bf8dfe69c8d806d00fac528521a6d92580646aa55a7f3d374cd72c4409712014c425493e4d8cbb7e4c08172745ec5f054d9895f7bac5014765b36af56ef21a84
-
SSDEEP
12288:nCQjgAtAHM+vetZxF5EWry8AJGy0+6Bd3X3uSN3mQ:n5ZWs+OZVEWry8AFwBd3X3JNWQ
Malware Config
Extracted
discordrat
-
discord_token
MTIzNzM5MzAyNjUyODMxNzQ2MA.G0y1Xb.9o_1Ees0G6RNPvIZ60KfHPTQzAoIqKeZUfoAhc
-
server_id
1237392946488410233
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 1660 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 1244 1blScenical_20K_-_16x.piz.exe 2128 WerFault.exe 2128 WerFault.exe 2128 WerFault.exe 2128 WerFault.exe 2128 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1244 wrote to memory of 1660 1244 1blScenical_20K_-_16x.piz.exe 28 PID 1244 wrote to memory of 1660 1244 1blScenical_20K_-_16x.piz.exe 28 PID 1244 wrote to memory of 1660 1244 1blScenical_20K_-_16x.piz.exe 28 PID 1660 wrote to memory of 2128 1660 backdoor.exe 29 PID 1660 wrote to memory of 2128 1660 backdoor.exe 29 PID 1660 wrote to memory of 2128 1660 backdoor.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1blScenical_20K_-_16x.piz.exe"C:\Users\Admin\AppData\Local\Temp\1blScenical_20K_-_16x.piz.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1660 -s 5963⤵
- Loads dropped DLL
PID:2128
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5255d307efe297278a0f5c8d54091a959
SHA1b61e214229d6c2192f61610d1a843f547d941c16
SHA256174440c48b60ba3b22ab706cc4dca25d41a6aaae5f88cbfa8ea5283f3c8e0516
SHA512087d8f5ccf9af3681110c50bd47d587f6a510d441cfa9821777d250d7458a2d8cdba9286fd10117cb763a23c43cb1bb252abbf8cc2e00ae0d880f6f88098c4aa