Malware Analysis Report

2024-11-16 13:06

Sample ID 240319-vbddjsgh24
Target silence.rar
SHA256 8cd446387f47cd667943aba6e1e636c36fe07fb2dbc0990201fb3552ca8077e4
Tags
discordrat persistence rat rootkit stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8cd446387f47cd667943aba6e1e636c36fe07fb2dbc0990201fb3552ca8077e4

Threat Level: Known bad

The file silence.rar was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit stealer

Discord RAT

Discordrat family

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-19 16:48

Signatures

Discordrat family

discordrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-19 16:48

Reported

2024-03-19 16:49

Platform

win10-20240221-en

Max time kernel

26s

Max time network

24s

Command Line

"C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4576 wrote to memory of 4396 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE
PID 4576 wrote to memory of 4396 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE
PID 4576 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE
PID 4576 wrote to memory of 4816 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE
PID 4816 wrote to memory of 4052 N/A C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE C:\Windows\system32\cmd.exe
PID 4816 wrote to memory of 4052 N/A C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE C:\Windows\system32\cmd.exe
PID 4052 wrote to memory of 3308 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 4052 wrote to memory of 3308 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 4052 wrote to memory of 3180 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 4052 wrote to memory of 3180 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 4052 wrote to memory of 4764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 4052 wrote to memory of 4764 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe

Processes

C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe

"C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"

C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE

"C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"

C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE

"C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD5 | find /i /v "md5" | find /i /v "certutil"

C:\Windows\system32\certutil.exe

certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD5

C:\Windows\system32\find.exe

find /i /v "md5"

C:\Windows\system32\find.exe

find /i /v "certutil"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.133.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 keyauth.win udp
US 8.8.8.8:53 234.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 104.26.0.5:443 keyauth.win tcp
N/A 127.0.0.1:49785 tcp
N/A 127.0.0.1:49787 tcp
US 8.8.8.8:53 geolocation-db.com udp
US 8.8.8.8:53 x2.c.lencr.org udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 5.0.26.104.in-addr.arpa udp
US 8.8.8.8:53 176.178.17.96.in-addr.arpa udp
DE 159.89.102.253:443 geolocation-db.com tcp
GB 173.222.13.40:80 x2.c.lencr.org tcp
US 8.8.8.8:53 40.13.222.173.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 253.102.89.159.in-addr.arpa udp
US 104.26.0.5:443 keyauth.win tcp
N/A 127.0.0.1:49797 tcp
N/A 127.0.0.1:49799 tcp
US 20.231.121.79:80 tcp

Files

C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE

MD5 6f9c42f940f854243a2f445c8cb750ec
SHA1 aeed75218753dd1f184cc55ebbe8a1a80e5a59f3
SHA256 15fbe5942c60d92081fa93d5444a7abb355dc917c9ea3a44585d5a4b4219e91a
SHA512 612bfac0a8a079a67e361e87ac6eaf9c9cc5a4940b5dd74ecb6c61e2811707b2e60e60ee70102622c0bb222b01a3aced82853d130d2f07075e8d629e33bb8cb2

C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE

MD5 8b393057c5c9026495f8efbe7234b1c4
SHA1 21aff93ce1ff29a961ac947cafd75b6994fb5ae8
SHA256 c100648181026be6dbce91beb36b5cd859563c4b0edd8e4a0aa5d60829467b30
SHA512 57504769cff622817a129f4b0d235d2f148a381d588950949f0b0316c71aef46e3d0d17747a50a81a946e73af486962d52f23160fe937c1d6caf8db4b1996952

memory/4396-7-0x000002CCEC390000-0x000002CCEC3A8000-memory.dmp

memory/4396-10-0x000002CCEEAA0000-0x000002CCEEC62000-memory.dmp

memory/4396-11-0x00007FF808800000-0x00007FF8091EC000-memory.dmp

memory/4396-12-0x000002CCEC720000-0x000002CCEC730000-memory.dmp

memory/4396-14-0x000002CCEF2A0000-0x000002CCEF7C6000-memory.dmp

memory/4396-15-0x00007FF808800000-0x00007FF8091EC000-memory.dmp

memory/4396-16-0x000002CCEC720000-0x000002CCEC730000-memory.dmp