Analysis
-
max time kernel
31s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 01:56
Behavioral task
behavioral1
Sample
ab4714df1877b59e511db33d45e27748.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ab4714df1877b59e511db33d45e27748.exe
Resource
win10v2004-20240704-en
General
-
Target
ab4714df1877b59e511db33d45e27748.exe
-
Size
78KB
-
MD5
ab4714df1877b59e511db33d45e27748
-
SHA1
9361f003225e8d9e6318d21a0ea4c3e8abd28098
-
SHA256
c294635103f902bcc9efe1b4ae4ef86b226a657b627fca38e0db840f882dd0a5
-
SHA512
ed18a6e4fa0d430068c7010f82cd315db61a59a1124b73485d605a7ba06a28272a9e75c00455cddfa134fe0877fd913bf708e58514ca96be92235cb8bad8ea04
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+9PIC:5Zv5PDwbjNrmAE+tIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1NzYzNjQ1NDI5MzcwNDcwNA.GriHoe.5AoWc0NGUyx_i3CgIfNmTychDUDT5RP-vDj-7Q
-
server_id
1214291005298315345
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2488 1420 ab4714df1877b59e511db33d45e27748.exe 29 PID 1420 wrote to memory of 2488 1420 ab4714df1877b59e511db33d45e27748.exe 29 PID 1420 wrote to memory of 2488 1420 ab4714df1877b59e511db33d45e27748.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4714df1877b59e511db33d45e27748.exe"C:\Users\Admin\AppData\Local\Temp\ab4714df1877b59e511db33d45e27748.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1420 -s 6002⤵PID:2488
-