Analysis

  • max time kernel
    129s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-05-2024 08:10

General

  • Target

    Tria.gay.exe

  • Size

    629KB

  • MD5

    b3cea39c19b4c87e9a4e5400fa5c9c48

  • SHA1

    d08516f598618d5d01f4ca0f536e1c946fe6bfec

  • SHA256

    c41bbd9aeb765015231cb1b05de9ef13fba577877a226817cfad9bfeebe8fc5a

  • SHA512

    322e324f2fe98ab272e92cb2663b16e20db7b61a1a170e2eb1c31b0ff9bf17d1c9a6e66819bd628d9611b6ed23be2e353b465f9bb7c9662252c5a49126c1dc6d

  • SSDEEP

    12288:0CQjgAtAHM+vetZxF5EWry8AJGy0Aq2aQOyfHrJnU44:05ZWs+OZVEWry8AFu2aQvfHmR

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzNDcyMDk2NjIzNjU3MzgwNg.GAgMA7.5Fr2VglBtzELzBN5jTv1isgkXurp9_3fiYShzU

  • server_id

    1235156619520901140

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Tria.gay.exe
    "C:\Users\Admin\AppData\Local\Temp\Tria.gay.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

    Filesize

    78KB

    MD5

    0cccb44d8b9efe2baa53f809f54923f6

    SHA1

    57f8d3877af9853fc9f880e05a045274dd7c7c3d

    SHA256

    7fbdcb4fc89ad23c70c9b17e5e633e4b4688beaa7081b7e530f156608246aee9

    SHA512

    0aef03daf778f7b0b5cc1a077fb0b7a37972220e816ce577968f564aa192e226658aced1865a5917d623d28ec53b3c92f893940fec726268f2cdb4b991227f32

  • memory/4324-10-0x00007FFF8D653000-0x00007FFF8D654000-memory.dmp

    Filesize

    4KB

  • memory/4324-11-0x000001E2469A0000-0x000001E2469B8000-memory.dmp

    Filesize

    96KB

  • memory/4324-12-0x000001E260FC0000-0x000001E261182000-memory.dmp

    Filesize

    1.8MB

  • memory/4324-13-0x00007FFF8D650000-0x00007FFF8E03C000-memory.dmp

    Filesize

    9.9MB

  • memory/4324-14-0x000001E2618A0000-0x000001E261DC6000-memory.dmp

    Filesize

    5.1MB

  • memory/4324-15-0x00007FFF8D653000-0x00007FFF8D654000-memory.dmp

    Filesize

    4KB

  • memory/4324-16-0x00007FFF8D650000-0x00007FFF8E03C000-memory.dmp

    Filesize

    9.9MB