Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe
Resource
win10v2004-20240508-en
General
-
Target
a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe
-
Size
543KB
-
MD5
a314b9e0e9d1559ba8cea4ab45070cb5
-
SHA1
071b321edc8f6429cf2706c697feafaa2a256604
-
SHA256
a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132
-
SHA512
1045d4a2649b2ce63acd3c08357e1622f6aff05bdf051b86f68d08540c7a12cfd7ced554789fcacc72022d691d84375a60bbca5cfeaf2e1d07cdc28da66b12ef
-
SSDEEP
12288:ftH5NLaAdDhAAEIFDf4iNzSHtonu8qi4c+J0/t35X:ftH5sAdXEIFDJNzSHWqi4fJ01F
Malware Config
Extracted
discordrat
-
discord_token
MTI0NDE5MDQ0Njk4OTYwNjkyMg.GKKSv3.QM0nX8HsEIYXvPn3-i6tD_jy99bQ-bFdZIMzN0
-
server_id
1244191426804322336
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
Processes:
backdoor.exepid process 2272 backdoor.exe -
Loads dropped DLL 6 IoCs
Processes:
a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exeWerFault.exepid process 3068 a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe 2904 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid process 2460 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exebackdoor.exedescription pid process target process PID 3068 wrote to memory of 2272 3068 a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe backdoor.exe PID 3068 wrote to memory of 2272 3068 a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe backdoor.exe PID 3068 wrote to memory of 2272 3068 a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe backdoor.exe PID 3068 wrote to memory of 2272 3068 a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe backdoor.exe PID 2272 wrote to memory of 2904 2272 backdoor.exe WerFault.exe PID 2272 wrote to memory of 2904 2272 backdoor.exe WerFault.exe PID 2272 wrote to memory of 2904 2272 backdoor.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe"C:\Users\Admin\AppData\Local\Temp\a3402ffe42ea57750ad44efb32044bcd39c170681bac3ad035ef8d0d31659132.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2272 -s 5963⤵
- Loads dropped DLL
PID:2904
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD5ac31fc8c103f1266ee1a3edf69fa87f5
SHA120e2b74440d590e10b5073e0f010c0077086d912
SHA2563bd843dae0143aee1c796499a3bfc50711a7f61e5f9fbfa5d0fe656e9b973332
SHA512fc8a8e783e2cf4b7a8ddab5e16471a79e1750f4701364f94e5d0884ceb651b02a56ed69b59a0c182b8d494d0af26c4d15b9b64bec353969c40810bf43fbe005b
-
Filesize
78KB
MD5a7e614f76e323a38fac45a85d5edaa0b
SHA190258c164b2da8cc44d0e1a02583c8559f94d57f
SHA2565900b6bc03b7829150eb05de0053a0aa4d0f1cf1b57f11018eb23848132e8c7a
SHA512ff7d4810de033e8ab2f75901d8b4306e84814ed73946fe26d50940d04948633367468bdadda80e2eea1465401314f19d2d5f7dabbeeb956a7b2a255567b5e184