Analysis Overview
SHA256
aed0081d6aa8fa3b29d155c6bb45e9278b4562102f8d4497a51db56871a74134
Threat Level: Known bad
The file monoware.exe was found to be: Known bad.
Malicious Activity Summary
Discordrat family
Discord RAT
Downloads MZ/PE file
Reads user/profile data of web browsers
Legitimate hosting services abused for malware hosting/C2
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-05-31 20:12
Signatures
Discordrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-31 20:12
Reported
2024-05-31 20:15
Platform
win7-20231129-en
Max time kernel
117s
Max time network
118s
Command Line
Signatures
Discord RAT
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1736 wrote to memory of 948 | N/A | C:\Users\Admin\AppData\Local\Temp\monoware.exe | C:\Windows\system32\WerFault.exe |
| PID 1736 wrote to memory of 948 | N/A | C:\Users\Admin\AppData\Local\Temp\monoware.exe | C:\Windows\system32\WerFault.exe |
| PID 1736 wrote to memory of 948 | N/A | C:\Users\Admin\AppData\Local\Temp\monoware.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\monoware.exe
"C:\Users\Admin\AppData\Local\Temp\monoware.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1736 -s 596
Network
Files
memory/1736-0-0x000007FEF5B83000-0x000007FEF5B84000-memory.dmp
memory/1736-1-0x000000013FEF0000-0x000000013FF08000-memory.dmp
memory/1736-2-0x000007FEF5B80000-0x000007FEF656C000-memory.dmp
memory/1736-3-0x000007FEF5B83000-0x000007FEF5B84000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-31 20:12
Reported
2024-05-31 20:14
Platform
win10v2004-20240426-en
Max time kernel
36s
Max time network
38s
Command Line
Signatures
Discord RAT
Downloads MZ/PE file
Reads user/profile data of web browsers
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | raw.githubusercontent.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\monoware.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\monoware.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\monoware.exe
"C:\Users\Admin\AppData\Local\Temp\monoware.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | gateway.discord.gg | udp |
| US | 162.159.134.234:443 | gateway.discord.gg | tcp |
| US | 8.8.8.8:53 | 234.134.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.138.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | geolocation-db.com | udp |
| DE | 159.89.102.253:443 | geolocation-db.com | tcp |
| US | 162.159.138.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 23.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.138.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 253.102.89.159.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 232.168.11.51.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 162.159.138.232:443 | discord.com | tcp |
| US | 162.159.138.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | raw.githubusercontent.com | udp |
| US | 185.199.111.133:443 | raw.githubusercontent.com | tcp |
| US | 162.159.138.232:443 | discord.com | tcp |
| US | 162.159.138.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 133.111.199.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
Files
memory/1676-0-0x0000027F9C7D0000-0x0000027F9C7E8000-memory.dmp
memory/1676-1-0x00007FF99C6E3000-0x00007FF99C6E5000-memory.dmp
memory/1676-2-0x0000027FB6D80000-0x0000027FB6F42000-memory.dmp
memory/1676-3-0x00007FF99C6E0000-0x00007FF99D1A1000-memory.dmp
memory/1676-4-0x0000027FB76C0000-0x0000027FB7BE8000-memory.dmp
memory/1676-5-0x00007FF99C6E3000-0x00007FF99C6E5000-memory.dmp
memory/1676-6-0x00007FF99C6E0000-0x00007FF99D1A1000-memory.dmp
memory/1676-7-0x0000027FB6CA0000-0x0000027FB6D16000-memory.dmp
memory/1676-8-0x0000027FB6C00000-0x0000027FB6C12000-memory.dmp
memory/1676-9-0x0000027FB6C30000-0x0000027FB6C4E000-memory.dmp