Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2024 18:01

Errors

Reason
Machine shutdown

General

  • Target

    Craker Internal.exe

  • Size

    715KB

  • MD5

    5ba4d91cfa1d7e34c466caf527e353ba

  • SHA1

    8ce8da48e63fd7172c7e7ffa7fca26f649617caa

  • SHA256

    7f28c4c57891ab3a441d9164e1307de587acaedb795764112390b8c17aaf812b

  • SHA512

    75d23c85b12cb4edf92a1697c57a349e47bbca6c31603fc219bbe051c52c47deb92e1f6ac2957ded0a1349ddd675a3a75a05c8cd4436af1b6423705a3394f204

  • SSDEEP

    12288:dyveQB/fTHIGaPkKEYzURNAwbAg8rlU/GnGy:duDXTIGaPhEYzUzA0qxU/GnGy

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0NjMwMTQ1MjQwNjc1MTI0Mg.GoEe4D.Ukxxcg2g6oiBh3IEoYa6C5FTUz1iU45J3sp1bU

  • server_id

    1246300545325727776

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe
    "C:\Users\Admin\AppData\Local\Temp\Craker Internal.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\HwidTempSpoofer.exe

    Filesize

    78KB

    MD5

    a2da8356ef064960ab8dd09372627a58

    SHA1

    2edb364315b7f1a5ee652e015a1316c6640d2d2b

    SHA256

    540611034c0489b1b4e2822b692bff7167369ceaea4bfd334aeaa33e0ae6ae6e

    SHA512

    9e4770e0d3a9404ea78d532b08e4b70c1be77fcd5797601fb17c18e45b991c10407c595a52ca361affd6bffeb476cdbcba184dd07142f10d74f23c4f357b6ace

  • memory/1140-12-0x00007FFFBA3E0000-0x00007FFFBA402000-memory.dmp

    Filesize

    136KB

  • memory/1140-13-0x000001C4396C0000-0x000001C4396D8000-memory.dmp

    Filesize

    96KB

  • memory/1140-14-0x000001C453D00000-0x000001C453EC2000-memory.dmp

    Filesize

    1.8MB

  • memory/1140-15-0x000001C454640000-0x000001C454B68000-memory.dmp

    Filesize

    5.2MB