Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe
Resource
win10v2004-20241007-en
General
-
Target
f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe
-
Size
476KB
-
MD5
23c3f2c8794f05b832c82f72258ba38a
-
SHA1
6d26d5bbe68f6908f5f43aa448238fd135d7bd93
-
SHA256
f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4
-
SHA512
87236ab4eeb9dfcabb28fce2708d02ef13550dccf488348907ee8764e47bf527cb8fb825bcf5152db25b621a53be6ef48d9ea11702e53c5bc32e5369edf2aafa
-
SSDEEP
12288:xCQjgAtAHM+vetZxF5EWry8AJGy0ObZh2IJBx:x5ZWs+OZVEWry8AF5b24
Malware Config
Extracted
discordrat
-
discord_token
MTI5NjYzNjQ4OTQ0NjE5OTQwOA.GEhciD.QzYUmAgRRkM4btANs6IF2LW4kGU-L42O5YO-Cs
-
server_id
1296636393107488851
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe -
Executes dropped EXE 1 IoCs
pid Process 2212 samp23.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 25 discord.com 56 discord.com 58 discord.com 76 discord.com 75 discord.com 14 discord.com 15 discord.com 57 discord.com 59 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2212 samp23.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2212 samp23.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4604 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2212 2064 f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe 85 PID 2064 wrote to memory of 2212 2064 f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe"C:\Users\Admin\AppData\Local\Temp\f58c9b8767ce04b32e3cbe7268c80921dafcbf8c8e5bf9d81a4b3eafc0647cb4.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\samp23.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\samp23.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD58d5085a3b59652009f453ed350c90315
SHA1d9faa65484d652e7a4ad41bc8f8208c0a0fb1343
SHA256fd75a4cb2497043b93f9027cc2116954fbb83865bdb040417da2a651ea88c425
SHA512ed2df9143d0a15a484e2b6ffa3257d9e17151fede7eb37140a096c28b33b4062d94afa0daf4d926d7bf5b0cfc0d0d72187c60033b7bcb861d93d3e4d3fa6cd3b