Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
WatchThigpjs.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
WatchThigpjs.exe
Resource
win10v2004-20240508-en
General
-
Target
WatchThigpjs.exe
-
Size
604KB
-
MD5
5dc72471a3a544dfbd2ebd65fad3a403
-
SHA1
9d953d6402225705068713cb203a30f317f7cd31
-
SHA256
b04ffd94e39de8e648b97403afdb5747c453f6d20876920c2eb8d41f7453f537
-
SHA512
8db977c7e467caa30d260b2311a469746890c3b80f8718085e1d6d1117f2ed976a892409f6ca842c51c5ad10651f8e5dc950391fb08fb39fd7c5cdb237d6c720
-
SSDEEP
12288:TCQjgAtAHM+vetZxF5EWry8AJGy0y/DODruQ5EqwmIBet:T5ZWs+OZVEWry8AFBmDEqxIkt
Malware Config
Extracted
discordrat
-
discord_token
MTI0MjgyODA0NTYzMTQ5MjE0Nw.GaK9_b.DkeSn-Pej4eo5IcrUmOmowhbH0dXKH8vZX3FZ4
-
server_id
1242477718638170204
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2172 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 1700 WatchThigpjs.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe 2736 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2172 1700 WatchThigpjs.exe 28 PID 1700 wrote to memory of 2172 1700 WatchThigpjs.exe 28 PID 1700 wrote to memory of 2172 1700 WatchThigpjs.exe 28 PID 2172 wrote to memory of 2736 2172 Client-built.exe 29 PID 2172 wrote to memory of 2736 2172 Client-built.exe 29 PID 2172 wrote to memory of 2736 2172 Client-built.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\WatchThigpjs.exe"C:\Users\Admin\AppData\Local\Temp\WatchThigpjs.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2172 -s 5963⤵
- Loads dropped DLL
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5bdeb1c21b2eb3126d5376a15e2438821
SHA17ee99a827ee71a6dc54d5e1adc1ee650f624bcab
SHA25635f586efd9b4582468ddeb877a576ae97737b7976e6f6622a2959053d35edc91
SHA5124dc3bffa35c9ae3b244f83a18b6043c9c2c6dd3b74e426bfd989662d71ca5ea1ad45839b24d9366fd390172b9bf34fce6552a866038b182b88fd2ccab888fdb8