Analysis

  • max time kernel
    1564s
  • max time network
    1567s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2024 11:11

General

  • Target

    https://www.upload.ee/files/16338433/Password_123.zip.html

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIxMzAyMTg5MDU1MDA0MjY2Ng.GSmB4g.z7mEl4nRyHZl4zLjxgwZ_ERwgZQJEakPOZ1N4I

  • server_id

    1213023729379053639

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.upload.ee/files/16338433/Password_123.zip.html
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1796 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2808
  • C:\Users\Admin\Desktop\Electron V3.exe
    "C:\Users\Admin\Desktop\Electron V3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2728 -s 600
      2⤵
        PID:1308

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

      Filesize

      1KB

      MD5

      55540a230bdab55187a841cfe1aa1545

      SHA1

      363e4734f757bdeb89868efe94907774a327695e

      SHA256

      d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb

      SHA512

      c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      67KB

      MD5

      753df6889fd7410a2e9fe333da83a429

      SHA1

      3c425f16e8267186061dd48ac1c77c122962456e

      SHA256

      b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

      SHA512

      9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      5108672d7bcce940d4bfe3647f6d066c

      SHA1

      011079ad80a17733d917cb56185c05063b02f320

      SHA256

      354691dca5fae4568094b363fc2ddc1e1f1c5d11baec8168dd08c0aaf00c0112

      SHA512

      6fe198ac567a557f2814e5bb71dd8026856bd08a7bf3d431ce25794593e764775916ce454c0d08772a797ff2b46fa9aa4aea18640706fdb3e8e7542a0e745472

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      ca1333e6d6ad2d9161f98bb0d374250c

      SHA1

      47573ee2ea7d16e92b3c0bb9ce55ec1491f91ddc

      SHA256

      0ceac784a495d89eb8f39808a113345949444044e216fdb217eedb9a8a6b51aa

      SHA512

      e2032ff5f4c7bde55b00abc4c33047f3b9994b628dbe98e21d5c59e99db97b950f23b821bae326429070bc909093956c21513bcd307870013cb936c06d994693

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      58146645164b39adb426a979f0ba70d8

      SHA1

      3658b8b8e261c77f8a7922a1dfbd0ac88a25f079

      SHA256

      b1b06d13393e3de495ea0f81387b48ef9f8b0eaf462916d2c033931aafeed5b2

      SHA512

      a2dbc580a3b27662b91af87473f14cce3162c111928d2ad5c89b82f95d1d37ae6ce4b96bb9a511ee154312738955462f291c8698feedabb66502d05d275bd6aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c57775d634701a85a7f92f346120c707

      SHA1

      299753f58393cb11996c4d3afaf23b617723c76e

      SHA256

      6c3cdc8f0ffe7cf7b674789ecd617144246b7e5f9093341350b2fd52a6f34d03

      SHA512

      f8361aed489abb45df0e251140e1c34fb29d79b6eb2a972386a35a715fbbfa5bc4512300c460a555cf3ca56243615347e296f9cb8d7a2d8f00a39a355875685e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e6c0671e9e3bc63a1e44ff021ef2ed3a

      SHA1

      34f14e5c848122c536be5c69daa8f3592643fca6

      SHA256

      e16979e0b8c1690454f2507fb9d56db83955bcfb13ba0ad3603901253fa04e82

      SHA512

      2d56198012575ee9f8097509db9e4d5e24ae1f9361d703691936e9a64292b63d6cca542f4c333464cb2dd3da81828dd1a69d50fe2beb2e7d5534628a0996bcd4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      e0ef5a755dcbac1fb509b3a1f3d2f614

      SHA1

      ba318bce53fda951c0b75eaa4eed04563806162d

      SHA256

      b8458de7e3b0e0a6a1e24f05e8dc06914d8d14418ae645cf3890ad5153c67bb3

      SHA512

      db6a7ebdbfd2f3934cf24dc7b1b83415d277636f7ed1188bea341314e5ddca72c2734beafff96ad2d124c0f952843f6c2a369682fbd41e7ad6d32ca582bb6c59

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      36a0967dd54444bf7a4e7d977f353518

      SHA1

      1499a82a2d46d64cb661c96ff6743a3b9a52de5f

      SHA256

      60e078db84836b3b9ff2d5ba6887e774bbdd95ff7870fb45da6f1896c60cd456

      SHA512

      621119acbb7506abfcffbfc0104a18561b95e6e6299774ae9c86403fc21e9a13a6dc1d95e9fa0f9b29b48e02da529ebfc9b413a0741af53d5d2889d5706a4dd8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a26fc91118e86fe01bd67eefa95ebf63

      SHA1

      9200c56f0851f6e96c89b84f4885179b77112b0d

      SHA256

      c7f8e3e96c5896658ce704da085407024e29935e14e9e3a28c716f5aa8501d93

      SHA512

      da8560431938ff2d82b8ade3e839b9878db2e8829b7a450f4f01021267e512a3cdf85cd58779a498ddf3094193e9f3c1212888fa5361bf3392f27b28de531b0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      f5fa74c1223e50cacf79e7334b008616

      SHA1

      78c1b8332c1f3015143c915dddd4fbd82be76340

      SHA256

      c008a2594d779ccad40133fd75549c6961076ac52c422c5ca39f6c8a78e459ac

      SHA512

      de5288097f4c4727dcfc7e8e26e4b13eab9f63001f013bdec5cd9fcac23abf74119965223e5a1a3891ba75ac08f47bb5b8caa71ecec07818576b5db8033e6bfc

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      75ecf95060c24c75d1260aaabd479420

      SHA1

      95cf8e12b349ac983b0d6fa4f23187ce39152558

      SHA256

      2cdfb1b8df0f9440be9b182a453a688f33dcfc0c3c4f46e8291c492864269567

      SHA512

      b45a13502f02b0b24da5c737cb4e75177f4e3d590f31a2693e6c9daa5312b4dc4e70c301b8b44ef8de78d555666f8af2644981d8525a004562d2115c9dab3f66

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cbcd1600169234dac62e5fdebc67308a

      SHA1

      dfff0da85e1b6f8e0d7531a01d8b4cff22270a57

      SHA256

      649d7da645b1d8d218cb375e899a32fbb24f8040817c274466a942c6bf6f04f6

      SHA512

      351611c364014ff48dac5d03ce88b8b3de838099416bfd3ed14b614cd47e5acfebaed7116b2ecf1912c987daf4df5262fde37b936109e804ff00dbddeda167ab

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      aa4c14f65d697383f18e600b4c26f912

      SHA1

      465d8875be5ffcc71887cbb3861273527bbb4c70

      SHA256

      587d5dbde76d01cd577dc9f1bd72a68748d311726d5f4fd390342edc3de1fe47

      SHA512

      ce8d56ba580dcdaf786f204b5982be10299ee41ed52e58dec11d35d5332e510493e455abfefe486b21ad0b3fbce814d6f4b8b9bc51468670f5faa3d982d670a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2a964506f1469e80f2a4e30fe8b38453

      SHA1

      4796237d6f230d4c086e7b024779803a61d22d82

      SHA256

      30dc1cd01850486b403072b09c801bcd01f64639d41353b64fefe5e718669f4e

      SHA512

      85c85ef1765ab4ae333e757c13de246410e347809cc70e4af309f13256b486207d7011781b393a1dc2d301c5cd6dbb03537db531151aa8aae33bc771baa27329

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      02ba7a8d812474fa131dac58d39646ef

      SHA1

      ae893800f0c9ba02111af99449836fe731ea0d33

      SHA256

      da303edd10b3184275c3e04c710c5b91b8d7a6abb2fc8556af19a4b580d9b1a1

      SHA512

      abca4c338c3e45d57c115d23b2d3f86bb7bb091ed2e1a2f674e72f61bc90eab7c5c73b6c8ebf572408156a3812f400de158d3d739a360315935e249bb26afd2d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      624504e892b19b98e4c422f3a2716e51

      SHA1

      92bda5ae2e5fcc2dd289160835a96f30c130948f

      SHA256

      d60b0ed3ce3c406672522b065d2af4de6f460e4bd0eb60515095725bfb91bcf8

      SHA512

      17c6e9cbb4bb4ec93e21820069eb51cf14e34e78de2397004641e6c262f022ccefe22259a8a8f5f663c199259e18bb199230da597c3d5e7d5d66244de385c832

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      62da97ee714b557034f53db8df23039a

      SHA1

      4e9139d93f973e0ffdde9c1b6453d48c30f27ac1

      SHA256

      1557e22825ea519364ad9be5ce8d91567887688345676ce0bfc3dcc8ee375d28

      SHA512

      d6c277f3263230d04e103e17aaa5ad82b2b20c99c1f7260872237d855e9fd2a4faf753020b08dcdd8554c837b76b3f3e92162f7e70b86ca72926b5d22d7b86e7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      cb9d805adc4459dde5952527f715122a

      SHA1

      a6557896895d8483c9fa735f0d002163d48ede8d

      SHA256

      4ce30250468add214e1b8b14ed5f0cdb84d869912522b66be18bc0865024582b

      SHA512

      86fd4b14fd5cc71fefffbac5748f4c3a46dbbe18d77ff04e8eaf012bef8b943df9eb24a0ceab469b2097a6cb6d06614c9d65431838d886b66f9a660a910dcb4f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\U4VLHPRO\Password_123[1].zip

      Filesize

      28KB

      MD5

      1937c2d21b0532f78d54dcb6f1d7d21b

      SHA1

      4e6541a1b1c1841330423798a573d51283a312c2

      SHA256

      fcfb47ce2a68976ff255af5ed4eeddff316f5b786fd2f932e545400079e25afc

      SHA512

      05e13a51ebaa3840202a0053461d3a278404e5a428a177cc8e6d4a46419b8059204316ae121a77f20631888d0b949585075362f3e5f1b5eb41a20bf27a78ee83

    • C:\Users\Admin\AppData\Local\Temp\Cab65D7.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar65E9.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar675A.tmp

      Filesize

      175KB

      MD5

      dd73cead4b93366cf3465c8cd32e2796

      SHA1

      74546226dfe9ceb8184651e920d1dbfb432b314e

      SHA256

      a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

      SHA512

      ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

    • memory/2728-463-0x000007FEF5C10000-0x000007FEF65FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2728-462-0x000000001BB50000-0x000000001BBD0000-memory.dmp

      Filesize

      512KB

    • memory/2728-461-0x000007FEF5C10000-0x000007FEF65FC000-memory.dmp

      Filesize

      9.9MB

    • memory/2728-460-0x000000013FCA0000-0x000000013FCB8000-memory.dmp

      Filesize

      96KB