Malware Analysis Report

2024-09-11 09:26

Sample ID 240523-d8zvdacf5w
Target Supra‮‮‮gpj.exe
SHA256 a7fda75ac14b403ed62f4a87fa7ffa55280b934d42a44d96266ef2e1f8e13257
Tags
discordrat persistence rat rootkit stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a7fda75ac14b403ed62f4a87fa7ffa55280b934d42a44d96266ef2e1f8e13257

Threat Level: Known bad

The file Supra‮‮‮gpj.exe was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit stealer

Discord RAT

Checks computer location settings

Executes dropped EXE

Loads dropped DLL

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-05-23 03:41

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-23 03:41

Reported

2024-05-23 03:44

Platform

win7-20240508-en

Max time kernel

119s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe

"C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe"

C:\Windows\system32\WerFault.exe

C:\Windows\system32\WerFault.exe -u -p 2540 -s 596

Network

N/A

Files

memory/1036-4-0x00000000020D0000-0x00000000020E0000-memory.dmp

\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe

MD5 bdeb1c21b2eb3126d5376a15e2438821
SHA1 7ee99a827ee71a6dc54d5e1adc1ee650f624bcab
SHA256 35f586efd9b4582468ddeb877a576ae97737b7976e6f6622a2959053d35edc91
SHA512 4dc3bffa35c9ae3b244f83a18b6043c9c2c6dd3b74e426bfd989662d71ca5ea1ad45839b24d9366fd390172b9bf34fce6552a866038b182b88fd2ccab888fdb8

memory/2540-11-0x000007FEF53D3000-0x000007FEF53D4000-memory.dmp

memory/2540-12-0x000000013F9C0000-0x000000013F9D8000-memory.dmp

memory/2540-17-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp

memory/2540-19-0x000007FEF53D0000-0x000007FEF5DBC000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-23 03:41

Reported

2024-05-23 03:44

Platform

win10v2004-20240226-en

Max time kernel

148s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe

"C:\Users\Admin\AppData\Local\Temp\Supra‮‮‮gpj.exe"

C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe

"C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3896 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 79.121.231.20.in-addr.arpa udp
US 8.8.8.8:53 241.150.49.20.in-addr.arpa udp
US 8.8.8.8:53 203.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.134.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 234.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 183.142.211.20.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 13.107.253.64:443 tcp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
GB 172.217.169.74:443 tcp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 12.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\RarSFX0\BackDoor.exe

MD5 bdeb1c21b2eb3126d5376a15e2438821
SHA1 7ee99a827ee71a6dc54d5e1adc1ee650f624bcab
SHA256 35f586efd9b4582468ddeb877a576ae97737b7976e6f6622a2959053d35edc91
SHA512 4dc3bffa35c9ae3b244f83a18b6043c9c2c6dd3b74e426bfd989662d71ca5ea1ad45839b24d9366fd390172b9bf34fce6552a866038b182b88fd2ccab888fdb8

memory/2860-14-0x00007FFC3D803000-0x00007FFC3D805000-memory.dmp

memory/2860-15-0x00000170F7530000-0x00000170F7548000-memory.dmp

memory/2860-16-0x00000170F9C50000-0x00000170F9E12000-memory.dmp

memory/2860-17-0x00007FFC3D800000-0x00007FFC3E2C1000-memory.dmp

memory/2860-18-0x00000170FAD00000-0x00000170FB228000-memory.dmp

memory/2860-19-0x00007FFC3D803000-0x00007FFC3D805000-memory.dmp

memory/2860-20-0x00007FFC3D800000-0x00007FFC3E2C1000-memory.dmp