Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2024, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
lorogpj.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lorogpj.exe
Resource
win10v2004-20241007-en
General
-
Target
lorogpj.exe
-
Size
267KB
-
MD5
9c8961e727c152ca6f691f787ce38897
-
SHA1
7c60e45f98f354a417c938d35c0dc084fc2ec1c1
-
SHA256
75aca327fc11dc2c409578d1104c8274933cccfe5ac6c674c995e64a35570587
-
SHA512
1bdc71b6cd6feca4f1203a6d50ade4491166e87113f9c30c099097e9013f14825dd7e259e72f5866dc9f7a290a3cd0722d00ed631d106dc92b76fbd2ca0b812a
-
SSDEEP
6144:bXhaVAhAD4U5lbVHTKa9m2tZMEtnEuLxE0w6aIdlvLhff22Qer/:bxaVAh64U5lL9m2nMEtEj0w1IdlvFffF
Malware Config
Extracted
discordrat
-
discord_token
MTMxOTI4NTMyNjI3NTAyMjg0OA.GdpNdo.AKlmUueGdkM0K-nySfjXqoZsXhtK7dQiDHiOtk
-
server_id
1319285142543663187
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation lorogpj.exe -
Executes dropped EXE 2 IoCs
pid Process 4012 e.exe 1988 e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lorogpj.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4012 e.exe Token: SeDebugPrivilege 1988 e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1728 wrote to memory of 4012 1728 lorogpj.exe 84 PID 1728 wrote to memory of 4012 1728 lorogpj.exe 84 PID 1728 wrote to memory of 1988 1728 lorogpj.exe 92 PID 1728 wrote to memory of 1988 1728 lorogpj.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\lorogpj.exe"C:\Users\Admin\AppData\Local\Temp\lorogpj.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD523878f53a8fec67042bf248e55c01cf1
SHA1a7311ae7537bbc360419e54a51ab75d3ba366589
SHA2564aea1dd2c5418922e05c5c2979ef3aa7b0c114a31a0e8effb60e532444d5e969
SHA512f2a5a90f398363867445472fc2a65f0bd184a66eb623f0a41b4b046de8ab15c0175333b02ce254d2d3612a890f34ff35e898b0e658bff44fff138e280483d4fb