Analysis
-
max time kernel
129s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-05-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
tsuama_prev.exe
Resource
win10-20240404-en
General
-
Target
tsuama_prev.exe
-
Size
723KB
-
MD5
dce88e7ad345b8e46f6f1a1e6c054ee1
-
SHA1
3b6c33722213bc904f36479641be338cadb0ed83
-
SHA256
99da4d4cc09dffe76b5b74fddbb21450d12ca6aca5a37c67f46016c29f5df26b
-
SHA512
15d7af628bbcfe66208ed4103b9ece065e74e1f19dc6e4d0894e7f1e0e99b3b1c6c4df0f761a88b7725439e299e563888c331f2aa1f00336693b0c8be3fe3bce
-
SSDEEP
12288:XBdlwHRn+WlYV+9JaDrbQq/Quey0QiiJfpN9rm/D:XBkVdlYA/a3E6nDfV0D
Malware Config
Extracted
discordrat
-
discord_token
MTI0MTc0NjYzOTg0MDg3NDU3OA.G_FG-L.PSiYWFXjGesyKl24G4RozFNhsD_phExOrrLPEM
-
server_id
1241747319624302674
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
backdoor.exepid process 4288 backdoor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
Processes:
flow ioc 14 raw.githubusercontent.com 24 raw.githubusercontent.com 3 discord.com 13 discord.com 25 discord.com 18 discord.com 23 discord.com 12 discord.com 15 raw.githubusercontent.com 17 discord.com 26 discord.com 4 discord.com 9 discord.com 22 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
backdoor.exedescription pid process Token: SeDebugPrivilege 4288 backdoor.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
tsuama_prev.exedescription pid process target process PID 2952 wrote to memory of 4288 2952 tsuama_prev.exe backdoor.exe PID 2952 wrote to memory of 4288 2952 tsuama_prev.exe backdoor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tsuama_prev.exe"C:\Users\Admin\AppData\Local\Temp\tsuama_prev.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5086ca72bf8f5409d33dc05e5a16aa323
SHA17239f64dbe797eceaf559e26fc9a4278721c229b
SHA25672ce77fc53c3f241ed2a94e075148e0a15dd82efa8b8a1bb755b0edfb9a90822
SHA512967f740cc5bb0a18e78849631b53e426f8fb05c115005ad9d420b50ff729f8afb4b010f13c45935f898772d3a1455aafeb52c96f56877966e958c5857a98ccd8