Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
23-03-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
qr.scr.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
qr.scr.exe
Resource
win10v2004-20240226-en
General
-
Target
qr.scr.exe
-
Size
589KB
-
MD5
e258820afbaf4806a0af98130aa7e188
-
SHA1
8384adb56549bb90f45feda7f61cf5f316a2e7b5
-
SHA256
41bfb9975a07c647313b8211c9096fd42c379ef1ab8aa55cf8754903636d57cd
-
SHA512
bfa53fab0079710ebad1fc05aec58f29a85f5f029b21a07f126d51858ea9ab93cc2467408a96ac761d3b01b3d5636763f6a8446f4830d2c665d7a246e4c40d86
-
SSDEEP
6144:vE+yclwQKjdn+WPtYVJIoBfnrI3Yraa41Uhmt+5jh4b+wmN:vBdlwHRn+WlYV+mOYrf8U0U16iws
Malware Config
Extracted
discordrat
-
discord_token
MTE2NTU4OTMzMjMxNzQ0MjEwOQ.GJEVtK.uFJuCXP9hMLmxL5S40swC_tXrG0HdGoTZYWDxI
-
server_id
1162644088261193840
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2560 qr.exe -
Loads dropped DLL 6 IoCs
pid Process 2168 qr.scr.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2136 DllHost.exe 2136 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2560 2168 qr.scr.exe 29 PID 2168 wrote to memory of 2560 2168 qr.scr.exe 29 PID 2168 wrote to memory of 2560 2168 qr.scr.exe 29 PID 2168 wrote to memory of 2560 2168 qr.scr.exe 29 PID 2560 wrote to memory of 2636 2560 qr.exe 30 PID 2560 wrote to memory of 2636 2560 qr.exe 30 PID 2560 wrote to memory of 2636 2560 qr.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\qr.scr.exe"C:\Users\Admin\AppData\Local\Temp\qr.scr.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\qr.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\qr.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2560 -s 5963⤵
- Loads dropped DLL
PID:2636
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5f7b79586fa0fd87f757302e947b07550
SHA175dc2e743ae79b2ee0350cd8086974eda23b3e17
SHA2560bc6f95b9438ef6a557beb35cd48d77bde265751db2a06273ae71b3ad008798f
SHA512ab56dd548d53ee77ccc30ab38e34f3d717ece5953a90334af819a818b573d5a1bfcf58fb661bd2883784ef8be05408edd1e8a1c1cd135d71dd05862f44af3dda
-
Filesize
302KB
MD5f8c5bb2e9929c86865c291de2b71ae6e
SHA1fdf6e43b696308f60f13e3b96d0482d3634992b6
SHA256271ed5f4d469576ac832f8b8f6734168a986619f3f0aebb1747efe583381ead2
SHA512c46dfb27428ac80bec7cd09d82aa65c59e343a73849965149275459fd5ee113c21d3bb744d41c1a93725e8ced8b22270891db055376a00136a59686365393fa4