Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16/12/2024, 05:19 UTC

General

  • Target

    Discord3.exe

  • Size

    47KB

  • MD5

    dcec31da98141bb5ebb57d474de65edc

  • SHA1

    56b0db53fb20b171291d2ad1066b2aea09bad38d

  • SHA256

    cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49

  • SHA512

    5b9332fdb1e21a0559e1c8052f7fef46465e4d7ea2d49d6894ca2ce575ba8158f2166bb40ce26ad5f7ad4e9a93728e565959d49583981ac7dfb20c659dbaee99

  • SSDEEP

    768:AuyJNTAoZjRWUJd9bmo2qL0i120YsvdPI5SqK20bbld2UVuVSUnJ5ScNBDZwx:AuyJNTAGL2MvaEqKZbbldX0l3Sudwx

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

18.ip.gl.ply.gg:6606

18.ip.gl.ply.gg:7707

18.ip.gl.ply.gg:8808

18.ip.gl.ply.gg:9028

Mutex

7U2HW8ZYjc9H

Attributes
  • delay

    3

  • install

    true

  • install_file

    Discord.exe

  • install_folder

    %AppData%

aes.plain
1
UBWWW3KXVDdHJELE2MlU9MArpc3NcBhQ

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord3.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"' & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "Discord" /tr '"C:\Users\Admin\AppData\Roaming\Discord.exe"'
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2704
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp698C.tmp.bat""
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\timeout.exe
        timeout 3
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:2788
      • C:\Users\Admin\AppData\Roaming\Discord.exe
        "C:\Users\Admin\AppData\Roaming\Discord.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:3000

Network

  • flag-us
    DNS
    18.ip.gl.ply.gg
    Discord.exe
    Remote address:
    8.8.8.8:53
    Request
    18.ip.gl.ply.gg
    IN A
    Response
    18.ip.gl.ply.gg
    IN A
    147.185.221.18
  • 147.185.221.18:9028
    18.ip.gl.ply.gg
    Discord.exe
    152 B
    3
  • 147.185.221.18:7707
    18.ip.gl.ply.gg
    Discord.exe
    152 B
    3
  • 147.185.221.18:7707
    18.ip.gl.ply.gg
    Discord.exe
    152 B
    3
  • 147.185.221.18:8808
    18.ip.gl.ply.gg
    Discord.exe
    152 B
    3
  • 147.185.221.18:6606
    18.ip.gl.ply.gg
    Discord.exe
    152 B
    3
  • 147.185.221.18:9028
    18.ip.gl.ply.gg
    Discord.exe
    104 B
    2
  • 8.8.8.8:53
    18.ip.gl.ply.gg
    dns
    Discord.exe
    61 B
    77 B
    1
    1

    DNS Request

    18.ip.gl.ply.gg

    DNS Response

    147.185.221.18

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp698C.tmp.bat

    Filesize

    151B

    MD5

    28a91f8d1f753ea7ab95dd1c42f5b3cd

    SHA1

    cb70e7e9432cb7617d19518df2fe77b9b965eab4

    SHA256

    917e162906b8ba22794b72d748aeeebf0deb2aa5e6b31f954fb76f47338efd63

    SHA512

    f95f179046555df0dc10a18bdfa71130349cdf55d888bebd20352a50cadd6d8ac539502b9f9b716cb7e54201e1ce287e7fc8f60101dea77e09ac6e6422591219

  • \Users\Admin\AppData\Roaming\Discord.exe

    Filesize

    47KB

    MD5

    dcec31da98141bb5ebb57d474de65edc

    SHA1

    56b0db53fb20b171291d2ad1066b2aea09bad38d

    SHA256

    cf1597d08ba3eddf6839c3b54c723ccc1db8d1c6edc1f416d05de29cec36aa49

    SHA512

    5b9332fdb1e21a0559e1c8052f7fef46465e4d7ea2d49d6894ca2ce575ba8158f2166bb40ce26ad5f7ad4e9a93728e565959d49583981ac7dfb20c659dbaee99

  • memory/1044-0-0x00000000740EE000-0x00000000740EF000-memory.dmp

    Filesize

    4KB

  • memory/1044-1-0x00000000013A0000-0x00000000013B2000-memory.dmp

    Filesize

    72KB

  • memory/1044-2-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/1044-12-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/3000-16-0x0000000000D10000-0x0000000000D22000-memory.dmp

    Filesize

    72KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.