Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    28-05-2024 13:13

General

  • Target

    banana‮png.exe

  • Size

    478KB

  • MD5

    4c3c1db7d951b6e6ecfb6e798df7f274

  • SHA1

    ac8c5317b900aed8787fe43bca0d5871c580abd3

  • SHA256

    d11237b84ac5e0498786aa2bb410659c087a148943bcfff4015f044ec0756cb3

  • SHA512

    17fc5f3c231bb3a78c500569b19a2c38f746571d479a613d88a617babae51e7e5aae19f28522b5bfb692b6f0daababfac620ca641850f01f7a988814c95ad37c

  • SSDEEP

    12288:wCQjgAtAHM+vetZxF5EWry8AJGy0ylCGvc+YR7x:w5ZWs+OZVEWry8AFBIGvYH

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0NDk4OTQ2MjkxMjY5NjMzMA.GIRO0i.b3bYZf7plrNBXM4V3TRj7NUzgJTJcKm3_NUU0o

  • server_id

    1244990153932673145

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\banana‮png.exe
    "C:\Users\Admin\AppData\Local\Temp\banana‮png.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2676 -s 596
        3⤵
        • Loads dropped DLL
        PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    256b75bf21c40761d931bb199b9ebc64

    SHA1

    e4ec59caab4afe8880c993e6183900c6b92af281

    SHA256

    10c77ad6339c4b5c3a575e55d1d7dda52af5820a3a9859309f23a43f27b3c2d0

    SHA512

    a3352d80f8f0c1f1cf29b3a671aef604dbd2bef149c4a71f4aa763bc0ae1d80d3889d34ce38afcf62a61c9730e5a463cae08edfd98a346937014ddb29b25c67c

  • memory/1644-2-0x0000000002090000-0x0000000002091000-memory.dmp

    Filesize

    4KB

  • memory/2676-9-0x000007FEF5C73000-0x000007FEF5C74000-memory.dmp

    Filesize

    4KB

  • memory/2676-10-0x000000013F4B0000-0x000000013F4C8000-memory.dmp

    Filesize

    96KB

  • memory/2676-15-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

    Filesize

    9.9MB

  • memory/2676-17-0x000007FEF5C70000-0x000007FEF665C000-memory.dmp

    Filesize

    9.9MB