Analysis
-
max time kernel
21s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 14:10
Behavioral task
behavioral1
Sample
bypasser/bypasser_final.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bypasser/bypasser_final.exe
Resource
win10v2004-20240508-en
General
-
Target
bypasser/bypasser_final.exe
-
Size
135KB
-
MD5
a1288b1ec6fb4da4f55dc8fd53a6c4ce
-
SHA1
bead8a51b0c34f981a4b278681f63f3b88f9ad54
-
SHA256
f7dd8d7d380e311b86e9fb2d61b63eb212e70f5e8e51acdbf47a1dd4ed051891
-
SHA512
2fa5aa3a0d4daaa57854a9045a12b7e01a0f9864924cde12935646b25f172c787b120bdaac65be85ebe442476c2c1f45b51b737ddbbd2579cf6416e65ab038a2
-
SSDEEP
1536:2vdWSVRVDlOzjRzrksAOO2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+pPICsov:2MSncRzAOOZv5PDwbjNrmAE+ZICsov
Malware Config
Extracted
discordrat
-
discord_token
MTI1MTMwNDM5NDkzNTUwNTA4Nw.GXLWWL.r7OUns0sCMr5I9ra_FffjxEK2E7LukBojfJIT8
-
server_id
1256804931839459358
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2724 CLIENT-BUILT.EXE -
Loads dropped DLL 6 IoCs
pid Process 3036 bypasser_final.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe 2524 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3036 wrote to memory of 2724 3036 bypasser_final.exe 28 PID 3036 wrote to memory of 2724 3036 bypasser_final.exe 28 PID 3036 wrote to memory of 2724 3036 bypasser_final.exe 28 PID 3036 wrote to memory of 2724 3036 bypasser_final.exe 28 PID 2724 wrote to memory of 2524 2724 CLIENT-BUILT.EXE 29 PID 2724 wrote to memory of 2524 2724 CLIENT-BUILT.EXE 29 PID 2724 wrote to memory of 2524 2724 CLIENT-BUILT.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bypasser\bypasser_final.exe"C:\Users\Admin\AppData\Local\Temp\bypasser\bypasser_final.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2724 -s 6003⤵
- Loads dropped DLL
PID:2524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5a654392da078edaa1e15edf5037892af
SHA17e46cf31017813ef3965ee4b0b4dc1cb8467eaf5
SHA256e8c4b3c1bf31627789ae496bda5014524cc6304c2f0b31f592cb4ce82703269c
SHA5123caf159430d00b513cfe2c1221f39643f00b018c0af7952c9a3c0fee43c9aacf3b0c55846ef137c66fa6c8c5c9b007d3f87c013d1de61811da22a9ad7d66d9dc