Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
15-05-2024 19:25
Behavioral task
behavioral1
Sample
e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe
Resource
win10v2004-20240426-en
General
-
Target
e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe
-
Size
78KB
-
MD5
027960765e97ac9bbed5e2247bdeab07
-
SHA1
df32d964c1a558515693b6601d50949fae85e33a
-
SHA256
e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58
-
SHA512
8e959f53417f2966bf8573d75ecff2a759c78998c974f4ba740c794465e8bf09490d5e3b263119bdcfb793437303d66a0576052175f813c7007b64c87b36e7ef
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+7PIC:5Zv5PDwbjNrmAE+zIC
Malware Config
Extracted
discordrat
-
discord_token
MTExOTY4MDYxNDIxNjUxNTY5NQ.GnP5TS.XB8k2brD-RpT8GqadOD-n2Ay0IKV9q3M55LoiA
-
server_id
1240327546898485268
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1704 wrote to memory of 3016 1704 e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe 28 PID 1704 wrote to memory of 3016 1704 e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe 28 PID 1704 wrote to memory of 3016 1704 e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe"C:\Users\Admin\AppData\Local\Temp\e2f8013b440201cfdd1db1c540af11dcb8120b27be6c04b33935785348506d58.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1704 -s 6002⤵PID:3016
-