Analysis

  • max time kernel
    361s
  • max time network
    368s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 20:16

General

  • Target

    s‮gpj.exe

  • Size

    563KB

  • MD5

    0bbc0a7dc1a58f8a33fbd893ec737bc2

  • SHA1

    6cc449fffcf0111d62ff0475afb30eef7d774089

  • SHA256

    9f7154d3786a9f445d249454777da82ebca55681b0fdbe54f1695ce31a30543f

  • SHA512

    d6a4cb34a70180951925d5414c1a563a37a5a6d5c92b6fc8c741711637ebd1af60a0e375e00334599f322226a084641f099042b524f7152c720f8a2e7ee14445

  • SSDEEP

    12288:oCQjgAtAHM+vetZxF5EWry8AJGy0yfnSWv46NuV9TXH2505/N:o5ZWs+OZVEWry8AFBTjNufH2kV

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIyOTg4MjMyNDM2ODM2MzcwMA.GrfReS.9yWuSoWr3uhKK0b6qurk33JdihJVamaZgss9Yg

  • server_id

    1229880755757514752

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\s‮gpj.exe
    "C:\Users\Admin\AppData\Local\Temp\s‮gpj.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2552 -s 600
        3⤵
        • Loads dropped DLL
        PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

    Filesize

    78KB

    MD5

    9c9b36aa4fbe85b60277dd6ea9caf0e1

    SHA1

    d037380d780a0165d02bdd51f3eb741519944a64

    SHA256

    42b7cc111a1773cec2eb5c5e97e9d03cf3d32cbff97dc1f8027ed65955d63c47

    SHA512

    a7d1d4d1f27407dcd49aaf111f84005534031cd4b705d2bc14a5594787af915410a82f41193072cddceeefd209997a24e379d970d94c8ff07bc5f950183884d6

  • memory/772-4-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/2552-11-0x000000013F310000-0x000000013F328000-memory.dmp

    Filesize

    96KB

  • memory/2552-12-0x000007FEF59F0000-0x000007FEF63DC000-memory.dmp

    Filesize

    9.9MB

  • memory/2552-13-0x00000000007B0000-0x0000000000830000-memory.dmp

    Filesize

    512KB

  • memory/2552-19-0x000007FEF59F0000-0x000007FEF63DC000-memory.dmp

    Filesize

    9.9MB