Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
Craker Internal.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Craker Internal.exe
Resource
win10v2004-20240508-en
General
-
Target
Craker Internal.exe
-
Size
715KB
-
MD5
5ba4d91cfa1d7e34c466caf527e353ba
-
SHA1
8ce8da48e63fd7172c7e7ffa7fca26f649617caa
-
SHA256
7f28c4c57891ab3a441d9164e1307de587acaedb795764112390b8c17aaf812b
-
SHA512
75d23c85b12cb4edf92a1697c57a349e47bbca6c31603fc219bbe051c52c47deb92e1f6ac2957ded0a1349ddd675a3a75a05c8cd4436af1b6423705a3394f204
-
SSDEEP
12288:dyveQB/fTHIGaPkKEYzURNAwbAg8rlU/GnGy:duDXTIGaPhEYzUzA0qxU/GnGy
Malware Config
Extracted
discordrat
-
discord_token
MTI0NjMwMTQ1MjQwNjc1MTI0Mg.GoEe4D.Ukxxcg2g6oiBh3IEoYa6C5FTUz1iU45J3sp1bU
-
server_id
1246300545325727776
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2524 HwidTempSpoofer.exe -
Loads dropped DLL 6 IoCs
pid Process 1740 Craker Internal.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2524 1740 Craker Internal.exe 28 PID 1740 wrote to memory of 2524 1740 Craker Internal.exe 28 PID 1740 wrote to memory of 2524 1740 Craker Internal.exe 28 PID 2524 wrote to memory of 2760 2524 HwidTempSpoofer.exe 29 PID 2524 wrote to memory of 2760 2524 HwidTempSpoofer.exe 29 PID 2524 wrote to memory of 2760 2524 HwidTempSpoofer.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe"C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2524 -s 5963⤵
- Loads dropped DLL
PID:2760
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5a2da8356ef064960ab8dd09372627a58
SHA12edb364315b7f1a5ee652e015a1316c6640d2d2b
SHA256540611034c0489b1b4e2822b692bff7167369ceaea4bfd334aeaa33e0ae6ae6e
SHA5129e4770e0d3a9404ea78d532b08e4b70c1be77fcd5797601fb17c18e45b991c10407c595a52ca361affd6bffeb476cdbcba184dd07142f10d74f23c4f357b6ace