Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
DaHood.gpj.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DaHood.gpj.exe
Resource
win10v2004-20240508-en
General
-
Target
DaHood.gpj.exe
-
Size
604KB
-
MD5
3be89519f380139c1f5698afc06b9dd8
-
SHA1
abba048a10d85b2c5616b0ecdba0f9829397b8c6
-
SHA256
f063571720be9d1d856161ed5ae224b94ca34bc26daff981824f50fb8b54dbc1
-
SHA512
5dfdcac44c79d0b21eb4ddf9d00e04cc1b19c5566f05a9b65d0b75561695d90277cd66f4112c0e54c9e3ad96383db902190d230e396143d7344e90a659398161
-
SSDEEP
12288:TCQjgAtAHM+vetZxF5EWry8AJGy0y/DODruQ5EfWmHBeh:T5ZWs+OZVEWry8AFBmDEfPHkh
Malware Config
Extracted
discordrat
-
discord_token
MTI0MjgyODA0NTYzMTQ5MjE0Nw.GaK9_b.DkeSn-Pej4eo5IcrUmOmowhbH0dXKH8vZX3FZ4
-
server_id
1242477718638170204
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2568 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 2192 DaHood.gpj.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2568 2192 DaHood.gpj.exe 28 PID 2192 wrote to memory of 2568 2192 DaHood.gpj.exe 28 PID 2192 wrote to memory of 2568 2192 DaHood.gpj.exe 28 PID 2568 wrote to memory of 2540 2568 Client-built.exe 29 PID 2568 wrote to memory of 2540 2568 Client-built.exe 29 PID 2568 wrote to memory of 2540 2568 Client-built.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\DaHood.gpj.exe"C:\Users\Admin\AppData\Local\Temp\DaHood.gpj.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2568 -s 5963⤵
- Loads dropped DLL
PID:2540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5bdeb1c21b2eb3126d5376a15e2438821
SHA17ee99a827ee71a6dc54d5e1adc1ee650f624bcab
SHA25635f586efd9b4582468ddeb877a576ae97737b7976e6f6622a2959053d35edc91
SHA5124dc3bffa35c9ae3b244f83a18b6043c9c2c6dd3b74e426bfd989662d71ca5ea1ad45839b24d9366fd390172b9bf34fce6552a866038b182b88fd2ccab888fdb8