Analysis
-
max time kernel
50s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 18:01
Static task
static1
Behavioral task
behavioral1
Sample
Craker Internal.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Craker Internal.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
Craker Internal.exe
-
Size
715KB
-
MD5
5ba4d91cfa1d7e34c466caf527e353ba
-
SHA1
8ce8da48e63fd7172c7e7ffa7fca26f649617caa
-
SHA256
7f28c4c57891ab3a441d9164e1307de587acaedb795764112390b8c17aaf812b
-
SHA512
75d23c85b12cb4edf92a1697c57a349e47bbca6c31603fc219bbe051c52c47deb92e1f6ac2957ded0a1349ddd675a3a75a05c8cd4436af1b6423705a3394f204
-
SSDEEP
12288:dyveQB/fTHIGaPkKEYzURNAwbAg8rlU/GnGy:duDXTIGaPhEYzUzA0qxU/GnGy
Malware Config
Extracted
discordrat
-
discord_token
MTI0NjMwMTQ1MjQwNjc1MTI0Mg.GoEe4D.Ukxxcg2g6oiBh3IEoYa6C5FTUz1iU45J3sp1bU
-
server_id
1246300545325727776
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\Control Panel\International\Geo\Nation Craker Internal.exe -
Executes dropped EXE 1 IoCs
pid Process 1140 HwidTempSpoofer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 17 discord.com 18 discord.com 25 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1140 HwidTempSpoofer.exe Token: SeShutdownPrivilege 1140 HwidTempSpoofer.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1140 2912 Craker Internal.exe 83 PID 2912 wrote to memory of 1140 2912 Craker Internal.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe"C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5a2da8356ef064960ab8dd09372627a58
SHA12edb364315b7f1a5ee652e015a1316c6640d2d2b
SHA256540611034c0489b1b4e2822b692bff7167369ceaea4bfd334aeaa33e0ae6ae6e
SHA5129e4770e0d3a9404ea78d532b08e4b70c1be77fcd5797601fb17c18e45b991c10407c595a52ca361affd6bffeb476cdbcba184dd07142f10d74f23c4f357b6ace