Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 23:49
Behavioral task
behavioral1
Sample
844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe
Resource
win10v2004-20240704-en
General
-
Target
844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe
-
Size
78KB
-
MD5
9eb52ecd2ebee534d94599da4bd46c04
-
SHA1
b8ab0f5b7150bec75e415c93b17e2c4416fd6be6
-
SHA256
844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c
-
SHA512
3b144c552f502e32e3fb80434325003e7166a54cd49b6e92a14ce613e997ea8fe3f5c1ac5ae1cc1e7e6a2b89b9ffb3c666ab50ae15600f001ae23e85a4fdd9a3
-
SSDEEP
1536:K2WjO8XeEXF15P7v88wbjNrfxCXhRoKV6+V+BPIC:KZb5PDwbjNrmAE+RIC
Malware Config
Extracted
discordrat
-
discord_token
https://discord.com/api/webhooks/1257820709976277022/ZKUIwRoOmFL26xJdo5bOvsIHc6sf8Aqh56lsJZeqf-0B2oOIF8YZT_m2Z518ZY6qCm_-
-
server_id
1257819778219900989
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2544 wrote to memory of 3044 2544 844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe 30 PID 2544 wrote to memory of 3044 2544 844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe 30 PID 2544 wrote to memory of 3044 2544 844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe"C:\Users\Admin\AppData\Local\Temp\844881f2b8a8f0073ddbdd6752a3f7a453ea8d99c34bc672cf050aa7e59abe5c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2544 -s 6002⤵PID:3044
-