Analysis
-
max time kernel
17s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
Slika.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Slika.exe
Resource
win10v2004-20240419-en
General
-
Target
Slika.exe
-
Size
511KB
-
MD5
a824dd544e724d77c77fdf2feb2b9b74
-
SHA1
8fc8bfad4186342ec23bac4e4b6ddc418f95b752
-
SHA256
5315aba66bce8841aecb2ea2645f0066059e333f05e3ef13bb48316567c644be
-
SHA512
2e5f8e17e29b4b8888f4b859747b4ef418a71796858b48a71cf86c400db09d2a37c2914add4aae23e217fc9457a4b10905e97dd32be313d1063980df0b39b9f2
-
SSDEEP
12288:9BdlwHRn+WlYV+510Hb/swEAL194qK3sahwtztDRjrFay:9BkVdlYA5ab/Tfc3s7tpxrFay
Malware Config
Extracted
discordrat
-
discord_token
MTIzNDc5NTgxMTQ4NTkwOTAzMg.Gfp7iJ.bapxbFsgZ1EZuZhUOCc0YFsSBvQdR1T3eklr_A
-
server_id
1232976963522789406
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 3004 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 1688 Slika.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3004 1688 Slika.exe 28 PID 1688 wrote to memory of 3004 1688 Slika.exe 28 PID 1688 wrote to memory of 3004 1688 Slika.exe 28 PID 1688 wrote to memory of 3004 1688 Slika.exe 28 PID 3004 wrote to memory of 2976 3004 Client-built.exe 29 PID 3004 wrote to memory of 2976 3004 Client-built.exe 29 PID 3004 wrote to memory of 2976 3004 Client-built.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Slika.exe"C:\Users\Admin\AppData\Local\Temp\Slika.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3004 -s 5963⤵
- Loads dropped DLL
PID:2976
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD527442c74ad2910fc97bc49599deaf48b
SHA11b4de74f6b9a4a2e4b290629e4ae00a2392a3b37
SHA2567c6c497e77e3da8aec1055413f7d560ad4cdfc3928fcf3f72b8d9a6bc94cfd97
SHA512a871cd304f61a4f7043257e0c77cabd1a9f6100841ca99909dfd3d2b36e2ff2dbcab29bfdf43a75e6b9d5d528bc6a334a17e8eb76311a096640135cea80debdd