Analysis
-
max time kernel
837s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 19:39
Behavioral task
behavioral1
Sample
SalesAndTales/SalesAndTales/TalesAndSales.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SalesAndTales/SalesAndTales/TalesAndSales.exe
Resource
win10v2004-20240709-en
General
-
Target
SalesAndTales/SalesAndTales/TalesAndSales.exe
-
Size
4.1MB
-
MD5
5071e6c3739ca8d176036501ff7b7692
-
SHA1
0e0ef970dc94a375a28b61baff395043c920484b
-
SHA256
dc8d4767a1022103802ec64fe86960bea13dd03ff1d0365c2519c7edc07b4841
-
SHA512
1c9e56a50ac7a3ee175d70b1e456cd69279fe94aac95ea66f4d1f782d2687b33f9c7b0a20d29a49ed06508279dc34f2d4d05ad5fb396a526226e27e93614753f
-
SSDEEP
98304:iUYt9cvtfCbuDlZM5Arxle1K+O9FbcBvzc8aEB:iUc9cv9EQ7oOx01awV
Malware Config
Extracted
discordrat
-
discord_token
MTI2MDIzODIzNTAxNjM2NDE0Mw.G_GGTS.fEW6l1WLOhjwEn42Roi-bpXTe-ZL_rK7J-jOto
-
server_id
1260238572166844487
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
TalesAndSales.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TalesAndSales.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
TalesAndSales.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TalesAndSales.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TalesAndSales.exe -
Processes:
resource yara_rule behavioral1/memory/2708-7-0x000000013F570000-0x00000001400AE000-memory.dmp themida behavioral1/memory/2708-8-0x000000013F570000-0x00000001400AE000-memory.dmp themida behavioral1/memory/2708-13-0x000000013F570000-0x00000001400AE000-memory.dmp themida -
Processes:
TalesAndSales.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TalesAndSales.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
TalesAndSales.exepid process 2708 TalesAndSales.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
TalesAndSales.exedescription pid process target process PID 2708 wrote to memory of 1728 2708 TalesAndSales.exe WerFault.exe PID 2708 wrote to memory of 1728 2708 TalesAndSales.exe WerFault.exe PID 2708 wrote to memory of 1728 2708 TalesAndSales.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SalesAndTales\SalesAndTales\TalesAndSales.exe"C:\Users\Admin\AppData\Local\Temp\SalesAndTales\SalesAndTales\TalesAndSales.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2708 -s 6042⤵PID:1728