Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-06-2024 18:01

General

  • Target

    Craker Internal.exe

  • Size

    715KB

  • MD5

    5ba4d91cfa1d7e34c466caf527e353ba

  • SHA1

    8ce8da48e63fd7172c7e7ffa7fca26f649617caa

  • SHA256

    7f28c4c57891ab3a441d9164e1307de587acaedb795764112390b8c17aaf812b

  • SHA512

    75d23c85b12cb4edf92a1697c57a349e47bbca6c31603fc219bbe051c52c47deb92e1f6ac2957ded0a1349ddd675a3a75a05c8cd4436af1b6423705a3394f204

  • SSDEEP

    12288:dyveQB/fTHIGaPkKEYzURNAwbAg8rlU/GnGy:duDXTIGaPhEYzUzA0qxU/GnGy

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0NjMwMTQ1MjQwNjc1MTI0Mg.GoEe4D.Ukxxcg2g6oiBh3IEoYa6C5FTUz1iU45J3sp1bU

  • server_id

    1246300545325727776

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe
    "C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2524 -s 596
        3⤵
        • Loads dropped DLL
        PID:2760
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2436

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe

      Filesize

      78KB

      MD5

      a2da8356ef064960ab8dd09372627a58

      SHA1

      2edb364315b7f1a5ee652e015a1316c6640d2d2b

      SHA256

      540611034c0489b1b4e2822b692bff7167369ceaea4bfd334aeaa33e0ae6ae6e

      SHA512

      9e4770e0d3a9404ea78d532b08e4b70c1be77fcd5797601fb17c18e45b991c10407c595a52ca361affd6bffeb476cdbcba184dd07142f10d74f23c4f357b6ace

    • memory/2524-8-0x000007FEF5443000-0x000007FEF5444000-memory.dmp

      Filesize

      4KB

    • memory/2524-9-0x000000013FB00000-0x000000013FB18000-memory.dmp

      Filesize

      96KB

    • memory/2524-14-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

      Filesize

      9.9MB

    • memory/2524-16-0x000007FEF5443000-0x000007FEF5444000-memory.dmp

      Filesize

      4KB