Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 03:43

General

  • Target

    1blScenical_20K_-_16x.piz.exe

  • Size

    523KB

  • MD5

    64a2c79e246b7146369116c889f213f9

  • SHA1

    7444066ee8820f3f8ad0829cd33304c9e0c79b8f

  • SHA256

    2e771dba0b3a759cfe36f121d6cbdbad4df8017bf0727166fe8e32c9629b4a25

  • SHA512

    bf8dfe69c8d806d00fac528521a6d92580646aa55a7f3d374cd72c4409712014c425493e4d8cbb7e4c08172745ec5f054d9895f7bac5014765b36af56ef21a84

  • SSDEEP

    12288:nCQjgAtAHM+vetZxF5EWry8AJGy0+6Bd3X3uSN3mQ:n5ZWs+OZVEWry8AFwBd3X3JNWQ

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNzM5MzAyNjUyODMxNzQ2MA.G0y1Xb.9o_1Ees0G6RNPvIZ60KfHPTQzAoIqKeZUfoAhc

  • server_id

    1237392946488410233

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1blScenical_20K_-_16x.piz.exe
    "C:\Users\Admin\AppData\Local\Temp\1blScenical_20K_-_16x.piz.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    255d307efe297278a0f5c8d54091a959

    SHA1

    b61e214229d6c2192f61610d1a843f547d941c16

    SHA256

    174440c48b60ba3b22ab706cc4dca25d41a6aaae5f88cbfa8ea5283f3c8e0516

    SHA512

    087d8f5ccf9af3681110c50bd47d587f6a510d441cfa9821777d250d7458a2d8cdba9286fd10117cb763a23c43cb1bb252abbf8cc2e00ae0d880f6f88098c4aa

  • memory/2020-12-0x00007FFB34383000-0x00007FFB34385000-memory.dmp

    Filesize

    8KB

  • memory/2020-13-0x0000011D90630000-0x0000011D90648000-memory.dmp

    Filesize

    96KB

  • memory/2020-14-0x0000011DAAD60000-0x0000011DAAF22000-memory.dmp

    Filesize

    1.8MB

  • memory/2020-15-0x00007FFB34380000-0x00007FFB34E41000-memory.dmp

    Filesize

    10.8MB

  • memory/2020-16-0x0000011DAB560000-0x0000011DABA88000-memory.dmp

    Filesize

    5.2MB

  • memory/2020-17-0x00007FFB34383000-0x00007FFB34385000-memory.dmp

    Filesize

    8KB

  • memory/2020-18-0x00007FFB34380000-0x00007FFB34E41000-memory.dmp

    Filesize

    10.8MB