Malware Analysis Report

2024-11-16 13:06

Sample ID 240319-vd25pagh87
Target silence.rar
SHA256 8cd446387f47cd667943aba6e1e636c36fe07fb2dbc0990201fb3552ca8077e4
Tags
discordrat persistence rat rootkit stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8cd446387f47cd667943aba6e1e636c36fe07fb2dbc0990201fb3552ca8077e4

Threat Level: Known bad

The file silence.rar was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit stealer

Discordrat family

Discord RAT

Checks computer location settings

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-03-19 16:53

Signatures

Discordrat family

discordrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-03-19 16:53

Reported

2024-03-19 16:53

Platform

win10v2004-20240226-en

Max time kernel

20s

Max time network

22s

Command Line

"C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4192 wrote to memory of 4768 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE
PID 4192 wrote to memory of 4768 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE
PID 4192 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE
PID 4192 wrote to memory of 2216 N/A C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE
PID 2216 wrote to memory of 1272 N/A C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE C:\Windows\system32\cmd.exe
PID 2216 wrote to memory of 1272 N/A C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE C:\Windows\system32\cmd.exe
PID 1272 wrote to memory of 2964 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 1272 wrote to memory of 2964 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\certutil.exe
PID 1272 wrote to memory of 3972 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 1272 wrote to memory of 3972 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 1272 wrote to memory of 2708 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe
PID 1272 wrote to memory of 2708 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\find.exe

Processes

C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe

"C:\Users\Admin\AppData\Local\Temp\silence\silence-workspace.exe"

C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE

"C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"

C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE

"C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD5 | find /i /v "md5" | find /i /v "certutil"

C:\Windows\system32\certutil.exe

certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE" MD5

C:\Windows\system32\find.exe

find /i /v "md5"

C:\Windows\system32\find.exe

find /i /v "certutil"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.136.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 keyauth.win udp
US 172.67.72.57:443 keyauth.win tcp
US 8.8.8.8:53 146.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 29.179.17.96.in-addr.arpa udp
US 8.8.8.8:53 234.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 57.72.67.172.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 g.bing.com udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 x2.c.lencr.org udp
US 8.8.8.8:53 geolocation-db.com udp
DE 159.89.102.253:443 geolocation-db.com tcp
US 204.79.197.200:443 g.bing.com tcp
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 40.13.222.173.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
GB 173.222.13.40:80 x2.c.lencr.org tcp
N/A 127.0.0.1:59725 tcp
N/A 127.0.0.1:59727 tcp
US 162.159.136.232:443 discord.com tcp
N/A 127.0.0.1:59751 tcp
N/A 127.0.0.1:59753 tcp
US 8.8.8.8:53 253.102.89.159.in-addr.arpa udp
US 8.8.8.8:53 200.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 172.67.72.57:443 keyauth.win tcp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE

MD5 6f9c42f940f854243a2f445c8cb750ec
SHA1 aeed75218753dd1f184cc55ebbe8a1a80e5a59f3
SHA256 15fbe5942c60d92081fa93d5444a7abb355dc917c9ea3a44585d5a4b4219e91a
SHA512 612bfac0a8a079a67e361e87ac6eaf9c9cc5a4940b5dd74ecb6c61e2811707b2e60e60ee70102622c0bb222b01a3aced82853d130d2f07075e8d629e33bb8cb2

C:\Users\Admin\AppData\Local\Temp\SILENCE-WORKSPACE.EXE

MD5 8b393057c5c9026495f8efbe7234b1c4
SHA1 21aff93ce1ff29a961ac947cafd75b6994fb5ae8
SHA256 c100648181026be6dbce91beb36b5cd859563c4b0edd8e4a0aa5d60829467b30
SHA512 57504769cff622817a129f4b0d235d2f148a381d588950949f0b0316c71aef46e3d0d17747a50a81a946e73af486962d52f23160fe937c1d6caf8db4b1996952

memory/4768-16-0x0000013A391B0000-0x0000013A391C8000-memory.dmp

memory/4768-19-0x0000013A53890000-0x0000013A53A52000-memory.dmp

memory/4768-20-0x00007FFDE38F0000-0x00007FFDE43B1000-memory.dmp

memory/4768-22-0x0000013A3AF60000-0x0000013A3AF70000-memory.dmp

memory/4768-23-0x0000013A54090000-0x0000013A545B8000-memory.dmp

memory/4768-24-0x00007FFDE38F0000-0x00007FFDE43B1000-memory.dmp