Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 14:06
Static task
static1
Behavioral task
behavioral1
Sample
cutecatgjp.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
cutecatgjp.exe
Resource
win10v2004-20240508-en
General
-
Target
cutecatgjp.exe
-
Size
571KB
-
MD5
56950b73f1d8a345e5cac4a890199ad6
-
SHA1
e06360883d38743190b0ce03eaf4ae61e50b104f
-
SHA256
32f2cb98c31c82d74dd71ff361c1b70b8a71b75b56348ce808d2521f4aab7b81
-
SHA512
f2c32d057c0e1ffa99d185ec4f6057f9941c8b21a51fdaf91f88f561e17ed07a74dafb1f213a066a52f79f771e1ca38ede6c663d471a325f3f900160c9f1e818
-
SSDEEP
12288:hyveQB/fTHIGaPkKEYzURNAwbAg8awGznzgJgHYxT4Nxt7HGt:huDXTIGaPhEYzUzA0q4znzgJgHYRmGt
Malware Config
Extracted
discordrat
-
discord_token
MTI1ODA0NzAxNDQ0MTMyNDY2NA.GJFaRS.ML3_kAVkMruyTd0hsxxYBK2V-qnvxomT03peSY
-
server_id
1255506406946373766
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cutecatgjp.exe -
Executes dropped EXE 1 IoCs
pid Process 4400 backdoor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4400 backdoor.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4400 1100 cutecatgjp.exe 81 PID 1100 wrote to memory of 4400 1100 cutecatgjp.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\cutecatgjp.exe"C:\Users\Admin\AppData\Local\Temp\cutecatgjp.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5cfc5ba6bfc1cb9ee620ec90d1f1adf90
SHA18edf8d4562c940cd5444aadeffe6657362a7262f
SHA256e6918fba0ddf8c2d9a7daf640762163dc8c2b9aaf474e3d45ddb2901328d5f16
SHA5129631aa7bab6c97aa19b365f5296f3fa37709349d567ba00d7bd8b67003279647ec62c18ddfd777990221300b1e069a09124e70d94496d2114aeffb67a9f5b58c