Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-07-2024 01:35
Behavioral task
behavioral1
Sample
3452a8da597975fc6a00c06c5106f009.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3452a8da597975fc6a00c06c5106f009.exe
Resource
win10v2004-20240611-en
General
-
Target
3452a8da597975fc6a00c06c5106f009.exe
-
Size
78KB
-
MD5
3452a8da597975fc6a00c06c5106f009
-
SHA1
4e5118042d641d12c0f6fc42a6eaeb86aed43fb6
-
SHA256
998be75a886cb45442cd31c27a72558459540f05d588961a67515ca98049f4d2
-
SHA512
b3e0f6d7ad90c4e60389594a35e7592bd651d544f68fc0f232c671d6da70f219176113ff031608a8c49e9c897898aaa9ccb485d1ba1f97180adfe44f0fbb41ba
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Malware Config
Extracted
discordrat
-
discord_token
MTI1NjY2NjMwMTQ4NTU1MTY5OA.GJPfoK.e4hSv7hek2RkFivU556o2-E78FxjuV2jTYvdLk
-
server_id
1256574491014725675
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2288 wrote to memory of 3040 2288 3452a8da597975fc6a00c06c5106f009.exe 28 PID 2288 wrote to memory of 3040 2288 3452a8da597975fc6a00c06c5106f009.exe 28 PID 2288 wrote to memory of 3040 2288 3452a8da597975fc6a00c06c5106f009.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3452a8da597975fc6a00c06c5106f009.exe"C:\Users\Admin\AppData\Local\Temp\3452a8da597975fc6a00c06c5106f009.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2288 -s 5962⤵PID:3040
-