Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/12/2024, 17:48
Behavioral task
behavioral1
Sample
Temp Spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Temp Spoofer.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
Temp Spoofer.exe
-
Size
78KB
-
MD5
358de6b4fccfc3039bfcf59625a3e222
-
SHA1
85ab66a8921277e1d0b1e0dbca3533271be3ad15
-
SHA256
57324656a109baebb74108a425c78e8e5e7f6ebafc5bc3a80fc44d5b99254fde
-
SHA512
deee1a31ca915e95a2d095351cbf446866e3c18e052a4b7f044c1f558ca1e98f6c1a9e7a8036a0170054cb83eb2600edd83cfcfaaf19fc426094b4f0fd3b3528
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+7PIC:5Zv5PDwbjNrmAE+zIC
Malware Config
Extracted
discordrat
-
discord_token
MTMxNTQ2NTY5MjY3MzQ3NDU5MQ.GPCiva.NkgczXS_PO9CFhqsuo2E4X4CaiS_1xP6NAtBb4
-
server_id
1315462772368085103
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 46 discord.com 56 discord.com 57 discord.com 58 discord.com 10 discord.com 19 discord.com 45 discord.com 47 discord.com 48 discord.com 51 discord.com 59 discord.com 9 discord.com -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4600 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 744 Temp Spoofer.exe Token: SeShutdownPrivilege 744 Temp Spoofer.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 744 wrote to memory of 656 744 Temp Spoofer.exe 99 PID 744 wrote to memory of 656 744 Temp Spoofer.exe 99 PID 744 wrote to memory of 3732 744 Temp Spoofer.exe 101 PID 744 wrote to memory of 3732 744 Temp Spoofer.exe 101 PID 3732 wrote to memory of 4600 3732 cmd.exe 103 PID 3732 wrote to memory of 4600 3732 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp Spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Temp Spoofer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C2⤵PID:656
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C ipconfig2⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\system32\ipconfig.exeipconfig3⤵
- Gathers network information
PID:4600
-
-