Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
Supragpj.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Supragpj.exe
Resource
win10v2004-20240226-en
General
-
Target
Supragpj.exe
-
Size
582KB
-
MD5
bca697f38134aaccd4c12c627a485cd4
-
SHA1
946ce90fe6191b15bd76d2908a50a3590778ce3f
-
SHA256
8cc512bb06d9e61f5f6b35a5d9df7fc185bd03989213097123f2484ce56acf5d
-
SHA512
ee44d0c84d3a377c954f9abd6d1b8047e3bebcf2da0b9f638898e76af1978c9b50cfeea11753a2e1f5358042b995527def12cff2447fafe6f4ebca1b3c554494
-
SSDEEP
12288:9CQjgAtAHM+vetZxF5EWry8AJGy0yWphU0Km1pmylo3jwE:95ZWs+OZVEWry8AFBB0L+0E
Malware Config
Extracted
discordrat
-
discord_token
MTI0NDM2Nzk4MjY3OTk0OTMyMg.Gv6eq-.Uq2lfr6CoxdEIxVy6jaTNSsvh2dmcKyuVrJL9k
-
server_id
1242477718638170204
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2528 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 2144 Supragpj.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2528 2144 Supragpj.exe 29 PID 2144 wrote to memory of 2528 2144 Supragpj.exe 29 PID 2144 wrote to memory of 2528 2144 Supragpj.exe 29 PID 2528 wrote to memory of 2704 2528 Client-built.exe 30 PID 2528 wrote to memory of 2704 2528 Client-built.exe 30 PID 2528 wrote to memory of 2704 2528 Client-built.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Supragpj.exe"C:\Users\Admin\AppData\Local\Temp\Supragpj.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2528 -s 5963⤵
- Loads dropped DLL
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c9f6d0a2a978429bff3496d993339f06
SHA158cf521791e969f1edecaf0e1e15fe8467e8205d
SHA256b1017a29cab062a104a5b946fbc23057738e7227289e1cf115cf82d9257e17b1
SHA51271bbf11f06faaf4fb355e33fd88923f02e7f25a7da667f5d4b620e697c9f072e8a34e3c0c745858d6b17dcb85e01a6c5962e98cbdd7097d0a442141470c02304