Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    20-05-2024 16:35

General

  • Target

    tsuama_prev.exe

  • Size

    723KB

  • MD5

    dce88e7ad345b8e46f6f1a1e6c054ee1

  • SHA1

    3b6c33722213bc904f36479641be338cadb0ed83

  • SHA256

    99da4d4cc09dffe76b5b74fddbb21450d12ca6aca5a37c67f46016c29f5df26b

  • SHA512

    15d7af628bbcfe66208ed4103b9ece065e74e1f19dc6e4d0894e7f1e0e99b3b1c6c4df0f761a88b7725439e299e563888c331f2aa1f00336693b0c8be3fe3bce

  • SSDEEP

    12288:XBdlwHRn+WlYV+9JaDrbQq/Quey0QiiJfpN9rm/D:XBkVdlYA/a3E6nDfV0D

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0MTc0NjYzOTg0MDg3NDU3OA.G_FG-L.PSiYWFXjGesyKl24G4RozFNhsD_phExOrrLPEM

  • server_id

    1241747319624302674

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tsuama_prev.exe
    "C:\Users\Admin\AppData\Local\Temp\tsuama_prev.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    086ca72bf8f5409d33dc05e5a16aa323

    SHA1

    7239f64dbe797eceaf559e26fc9a4278721c229b

    SHA256

    72ce77fc53c3f241ed2a94e075148e0a15dd82efa8b8a1bb755b0edfb9a90822

    SHA512

    967f740cc5bb0a18e78849631b53e426f8fb05c115005ad9d420b50ff729f8afb4b010f13c45935f898772d3a1455aafeb52c96f56877966e958c5857a98ccd8

  • memory/4288-12-0x00007FFFCCAA3000-0x00007FFFCCAA4000-memory.dmp

    Filesize

    4KB

  • memory/4288-13-0x00000295B05F0000-0x00000295B0608000-memory.dmp

    Filesize

    96KB

  • memory/4288-14-0x00000295CAB20000-0x00000295CACE2000-memory.dmp

    Filesize

    1.8MB

  • memory/4288-15-0x00007FFFCCAA0000-0x00007FFFCD48C000-memory.dmp

    Filesize

    9.9MB

  • memory/4288-16-0x00000295CB450000-0x00000295CB976000-memory.dmp

    Filesize

    5.1MB

  • memory/4288-17-0x00007FFFCCAA0000-0x00007FFFCD48C000-memory.dmp

    Filesize

    9.9MB

  • memory/4288-18-0x00000295CC2A0000-0x00000295CC316000-memory.dmp

    Filesize

    472KB

  • memory/4288-19-0x00000295CA9F0000-0x00000295CAA02000-memory.dmp

    Filesize

    72KB

  • memory/4288-20-0x00000295CAA20000-0x00000295CAA3E000-memory.dmp

    Filesize

    120KB

  • memory/4288-21-0x00000295CAF20000-0x00000295CB1EA000-memory.dmp

    Filesize

    2.8MB