Resubmissions

03-07-2024 14:10

240703-rg6eqs1hmg 10

03-07-2024 14:06

240703-rec1ea1fmb 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 14:06

General

  • Target

    cutecat‮gjp.exe

  • Size

    571KB

  • MD5

    56950b73f1d8a345e5cac4a890199ad6

  • SHA1

    e06360883d38743190b0ce03eaf4ae61e50b104f

  • SHA256

    32f2cb98c31c82d74dd71ff361c1b70b8a71b75b56348ce808d2521f4aab7b81

  • SHA512

    f2c32d057c0e1ffa99d185ec4f6057f9941c8b21a51fdaf91f88f561e17ed07a74dafb1f213a066a52f79f771e1ca38ede6c663d471a325f3f900160c9f1e818

  • SSDEEP

    12288:hyveQB/fTHIGaPkKEYzURNAwbAg8awGznzgJgHYxT4Nxt7HGt:huDXTIGaPhEYzUzA0q4znzgJgHYRmGt

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI1ODA0NzAxNDQ0MTMyNDY2NA.GJFaRS.ML3_kAVkMruyTd0hsxxYBK2V-qnvxomT03peSY

  • server_id

    1255506406946373766

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cutecat‮gjp.exe
    "C:\Users\Admin\AppData\Local\Temp\cutecat‮gjp.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2808 -s 600
        3⤵
        • Loads dropped DLL
        PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
    Filesize

    78KB

    MD5

    cfc5ba6bfc1cb9ee620ec90d1f1adf90

    SHA1

    8edf8d4562c940cd5444aadeffe6657362a7262f

    SHA256

    e6918fba0ddf8c2d9a7daf640762163dc8c2b9aaf474e3d45ddb2901328d5f16

    SHA512

    9631aa7bab6c97aa19b365f5296f3fa37709349d567ba00d7bd8b67003279647ec62c18ddfd777990221300b1e069a09124e70d94496d2114aeffb67a9f5b58c

  • memory/1620-4-0x0000000003190000-0x0000000003191000-memory.dmp
    Filesize

    4KB

  • memory/1620-19-0x0000000003190000-0x0000000003191000-memory.dmp
    Filesize

    4KB

  • memory/2808-11-0x000007FEF51B3000-0x000007FEF51B4000-memory.dmp
    Filesize

    4KB

  • memory/2808-12-0x000000013F2F0000-0x000000013F308000-memory.dmp
    Filesize

    96KB

  • memory/2808-17-0x000007FEF51B0000-0x000007FEF5B9C000-memory.dmp
    Filesize

    9.9MB

  • memory/2808-20-0x000007FEF51B3000-0x000007FEF51B4000-memory.dmp
    Filesize

    4KB

  • memory/2808-21-0x000007FEF51B0000-0x000007FEF5B9C000-memory.dmp
    Filesize

    9.9MB