Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2025, 17:08 UTC
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
61cc66d0b245e378647cfe3a56a51814
-
SHA1
b097cfda475efe6f4819b6c2db99caf744632f2f
-
SHA256
7c52f297d8d829076e1607c1b7a7a5e584adef82a01e2520dabe6ca801fb55ed
-
SHA512
422a99ce926f2793bff05837e9a226c937a89f59b221b0f9b346a1e7d32f423d2a3b6d8efe87111164884ef3983b6e50aace751531998c4574ea5b2e96da4b74
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC
Malware Config
Extracted
discordrat
-
discord_token
MTMwODUzODYxNDg0MTM0NDAyMQ.GZlTOB.ShLTCmYqgKpUZGmBxJbpfXARUmaxc_aOPfIYyU
-
server_id
1336013454258995351
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4644 vlc.exe 876 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4644 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1240 Client-built.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4644 vlc.exe 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3832
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\InitializeRepair.MTS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4644
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\InvokeApprove.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:876
Network
-
Remote address:8.8.8.8:53Requestgateway.discord.ggIN AResponsegateway.discord.ggIN A162.159.134.234gateway.discord.ggIN A162.159.136.234gateway.discord.ggIN A162.159.130.234gateway.discord.ggIN A162.159.135.234gateway.discord.ggIN A162.159.133.234
-
Remote address:162.159.134.234:443RequestGET /?v=9&encording=json HTTP/1.1
Connection: Upgrade,Keep-Alive
Upgrade: websocket
Sec-WebSocket-Key: FNJQYDLXYCK6dVsUcacBsQ==
Sec-WebSocket-Version: 13
Host: gateway.discord.gg
ResponseHTTP/1.1 101 Switching Protocols
Connection: upgrade
sec-websocket-accept: GuilOV2xuB/+aMQj7oO6mFX41QI=
upgrade: websocket
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TFA3id1RsVri1crCPhsMGlgCpltlpzhbGeAsQ0AlKk05phkHAex%2FO5zi%2F9YGiGMlyhG3i%2FXpwnZULZD9hZjUGq4LhUsAJLE%2Bwyf6xxxQQ71FLUWsA%2FVB%2B5NdzWRAqT9s5NTpjQ%3D%3D"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Content-Type-Options: nosniff
Server: cloudflare
CF-RAY: 90c406c9fe2677b8-LHR
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request234.134.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.144.22.2.in-addr.arpaIN PTRResponse73.144.22.2.in-addr.arpaIN PTRa2-22-144-73deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request64.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request5.114.82.104.in-addr.arpaIN PTRResponse5.114.82.104.in-addr.arpaIN PTRa104-82-114-5deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request96.252.19.2.in-addr.arpaIN PTRResponse96.252.19.2.in-addr.arpaIN PTRa2-19-252-96deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request13.153.16.2.in-addr.arpaIN PTRResponse13.153.16.2.in-addr.arpaIN PTRa2-16-153-13deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request85.49.80.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request182.129.81.91.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestroaming.officeapps.live.comIN AResponseroaming.officeapps.live.comIN CNAMEprod.roaming1.live.com.akadns.netprod.roaming1.live.com.akadns.netIN CNAMEeur.roaming1.live.com.akadns.neteur.roaming1.live.com.akadns.netIN CNAMEuks-azsc-000.roaming.officeapps.live.comuks-azsc-000.roaming.officeapps.live.comIN CNAMEosiprod-uks-buff-azsc-000.uksouth.cloudapp.azure.comosiprod-uks-buff-azsc-000.uksouth.cloudapp.azure.comIN A52.109.28.47
-
Remote address:52.109.28.47:443RequestPOST /rs/RoamingSoapService.svc HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
User-Agent: MS-WebServices/1.0
SOAPAction: "http://tempuri.org/IRoamingSettingsService/GetConfig"
Content-Length: 511
Host: roaming.officeapps.live.com
ResponseHTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/10.0
X-OfficeFE: RoamingFE_IN_33
X-OfficeVersion: 16.0.18527.30575
X-OfficeCluster: uks-000.roaming.officeapps.live.com
Content-Security-Policy-Report-Only: script-src 'nonce-Lr3h60ZiI14WlCydIiRCEVQhKMNBpLJgG835jKxDsWdQcJXiY43Z1OD8uMP9UJjfmIx3HpznX2GpN904AcsgrcMIt5Snv44w4v/oD22DekJC7LHk1L05X1+nmQcrBNDfa8YlD72G2yrjoDPIWB3Ib9BotPIlEALZCPM7wbAM15s=' 'unsafe-inline' 'unsafe-eval' 'strict-dynamic' https:; base-uri 'self'; object-src 'none'; require-trusted-types-for 'script'; report-uri https://csp.microsoft.com/report/OfficeIce-OfficeRoaming-Prod; frame-ancestors 'none';
X-Frame-Options: Deny
X-CorrelationId: ca445b24-8900-44ac-bd8d-4849d225b5d2
X-Powered-By: ASP.NET
Date: Mon, 03 Feb 2025 17:11:25 GMT
Content-Length: 654
-
Remote address:8.8.8.8:53Request97.32.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request47.28.109.52.in-addr.arpaIN PTRResponse
-
1.3kB 4.5kB 12 14
HTTP Request
GET https://gateway.discord.gg/?v=9&encording=jsonHTTP Response
101 -
1.8kB 8.3kB 12 11
HTTP Request
POST https://roaming.officeapps.live.com/rs/RoamingSoapService.svcHTTP Response
200
-
64 B 144 B 1 1
DNS Request
gateway.discord.gg
DNS Response
162.159.134.234162.159.136.234162.159.130.234162.159.135.234162.159.133.234
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
74 B 136 B 1 1
DNS Request
234.134.159.162.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
73.144.22.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
64.159.190.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
5.114.82.104.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
96.252.19.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
13.153.16.2.in-addr.arpa
-
70 B 145 B 1 1
DNS Request
85.49.80.91.in-addr.arpa
-
72 B 147 B 1 1
DNS Request
182.129.81.91.in-addr.arpa
-
73 B 244 B 1 1
DNS Request
roaming.officeapps.live.com
DNS Response
52.109.28.47
-
71 B 145 B 1 1
DNS Request
97.32.109.52.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
47.28.109.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD5366480bd727fd4904c29eebce4bd875a
SHA1c1eb162f4461d160d276f56f00609977927ef081
SHA2564f07847824097c98f99d5d732bbc2842c23e676fe2a64f39c5451a0b37b07c20
SHA51206a6ff451ca1509087e386b0ffc206345648c6cd088217ed20074c56ae657e34e6de7be37a347dd70e84992f9cd5b033e327fa34dfab2ad4aaba2c7ab179563e