Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241023-en
  • resource tags

    arch:x64arch:x86image:win11-20241023-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    10/01/2025, 01:38

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    b86d8efe9b7c845319b5c81c576cef1c

  • SHA1

    53c711029eeac602223974fa462404ddf891891b

  • SHA256

    b4fac89f795d7ef39a31e320b9b3c414ecbff3799ec2fdf2202ff1947e6dcd41

  • SHA512

    a7e73d38ed9d81d2c4e35bded858355a80aeef1d1c1a8fbce7e91d8cf82ef9075144d7444de4a7e259e9764a7d30610f4ffa4daa959341c8bc510f8a0494265b

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+yPIC:5Zv5PDwbjNrmAE++IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxNzk1MTI1OTgxODMzMjI1MQ.GKAyxn.C2N604MXRMjJY6a_7Fv_SRa3Og7h1pvsrL3mQU

  • server_id

    1317948076505169970

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2052-0-0x00007FFFC93D3000-0x00007FFFC93D5000-memory.dmp

    Filesize

    8KB

  • memory/2052-1-0x00000179ADF80000-0x00000179ADF98000-memory.dmp

    Filesize

    96KB

  • memory/2052-2-0x00000179C8770000-0x00000179C8932000-memory.dmp

    Filesize

    1.8MB

  • memory/2052-3-0x00007FFFC93D0000-0x00007FFFC9E92000-memory.dmp

    Filesize

    10.8MB

  • memory/2052-4-0x00000179C99F0000-0x00000179C9F18000-memory.dmp

    Filesize

    5.2MB

  • memory/2052-5-0x00007FFFC93D3000-0x00007FFFC93D5000-memory.dmp

    Filesize

    8KB

  • memory/2052-6-0x00007FFFC93D0000-0x00007FFFC9E92000-memory.dmp

    Filesize

    10.8MB

  • memory/2052-7-0x00000179CC370000-0x00000179CC3E6000-memory.dmp

    Filesize

    472KB

  • memory/2052-8-0x00000179AE4E0000-0x00000179AE4F2000-memory.dmp

    Filesize

    72KB

  • memory/2052-9-0x00000179AE560000-0x00000179AE57E000-memory.dmp

    Filesize

    120KB