Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/11/2024, 00:05

241103-adedeazapr 10

03/11/2024, 00:04

241103-acz9gszanr 10

Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    03/11/2024, 00:05

General

  • Target

    very safe file.exe

  • Size

    78KB

  • MD5

    cbf14a9b049c003d8f012614a069a6f8

  • SHA1

    ca37f791ac2a8d807e8d7253ad5f95cbf8b5f03f

  • SHA256

    a6ab4d699ea895b543fb588136f70c5475a68eac219c757244b416cdb4b49f25

  • SHA512

    8c6919e40adc19be99058299b17a6a67f577d5742c567a89a3cfdeb14f1cbb3097ff6493f3a2451d7d2f3298e170ca422985a69773216a832f4761160279e08d

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+NPIC:5Zv5PDwbjNrmAE+dIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5OTEzNTM5MDMyOTg2ODM4MA.GcPrZo.RcUINjvHKI9cJ0SAci6FL2XR-JKwo_aZb6nEww

  • server_id

    1302316235262001152

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\very safe file.exe
    "C:\Users\Admin\AppData\Local\Temp\very safe file.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3164-0-0x00007FFB80023000-0x00007FFB80025000-memory.dmp

    Filesize

    8KB

  • memory/3164-1-0x000001F110FB0000-0x000001F110FC8000-memory.dmp

    Filesize

    96KB

  • memory/3164-2-0x000001F12B830000-0x000001F12B9F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3164-3-0x00007FFB80020000-0x00007FFB80AE2000-memory.dmp

    Filesize

    10.8MB

  • memory/3164-4-0x000001F12C130000-0x000001F12C658000-memory.dmp

    Filesize

    5.2MB

  • memory/3164-5-0x00007FFB80023000-0x00007FFB80025000-memory.dmp

    Filesize

    8KB

  • memory/3164-6-0x00007FFB80020000-0x00007FFB80AE2000-memory.dmp

    Filesize

    10.8MB