Analysis
-
max time kernel
72s -
max time network
80s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
26-05-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
AVRgpj.exe
Resource
win10-20240404-en
General
-
Target
AVRgpj.exe
-
Size
297KB
-
MD5
dbd179cc8f595d2dcd06ce5f311e1e24
-
SHA1
479d4a7ad52dc0f6c58af549fcc923597cbc37e0
-
SHA256
0254f150e1cdc3d3eaed66f447d504546f373bfcc859bd734318cc591396af3b
-
SHA512
5c9bed345d476d80892a58054cebf814c298bb7a61ad097ece8b75deb9b85004c452c63fca1c0047e00e96650beecf905c513dfeb43ccc0a2ec4261268fb292a
-
SSDEEP
6144:jIIcrXQ4S33w614mazUBHfSdocWYD24Oa6H8DnJanjrEKBjkX:NcrNS33L10QdrXjR8DnJwjrFaX
Malware Config
Extracted
discordrat
-
discord_token
MTI0NDI2MjA4MDQ2NzQzOTY4OQ.GEmRlk.y7FwMWQJO6hXjnP2izfKreLqlEjH5raquqQ4R0
-
server_id
1241111187761004696
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 4480 av.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 9 discord.com 5 discord.com 6 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4480 av.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4480 2988 AVRgpj.exe 72 PID 2988 wrote to memory of 4480 2988 AVRgpj.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\AVRgpj.exe"C:\Users\Admin\AppData\Local\Temp\AVRgpj.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\av.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\av.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5b62264f264fac36f1155abb7a2605c48
SHA1d247059a5cde478128840949e7d7c421730ab56c
SHA256072dde2a673c6bf2867464fd96894e5c906eebb0e2716cd6538a2066b49df849
SHA5127259632249fc4776dd619cc75c289417d9d0571c08aa61031b2ebacfde6241d1264ca1fcd96b7eb3d16456e908cd150adda54ded10f3830507fc0e6858e97f75