Analysis
-
max time kernel
80s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 09:21
Behavioral task
behavioral1
Sample
malware.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
malware.exe
Resource
win10v2004-20240709-en
General
-
Target
malware.exe
-
Size
4.7MB
-
MD5
cf3498a5b7087f12b97f746c644bb60a
-
SHA1
bcb7c90fac1b84c891d54742efc3db9b64b59f94
-
SHA256
1469af0195b28f87817548a6063a5dd062ab2d0fd77a20b749625ccef01e292f
-
SHA512
8df02ec2f8aa5ff2da094adaead7c23e158f93db31d3d9ac423ec882c5a26704905f1459b917a97f00a9938092ccc35976d26e6ffab8b5f804c473bebac65254
-
SSDEEP
98304:WS5vaHahdYUk2TjtDRtVqDRpDv7hl+1jLPtVeNr3b:WP6Y21DRTqDb7GRVeNr3b
Malware Config
Extracted
discordrat
-
discord_token
MTI2MTcwMjM0NDQ4ODUyMTgwOQ.GItusX.BlaHBlSUZLcFqixVU_n9ThfF3DpKJGJou_LNIE
-
server_id
1261770885514137682
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
malware.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ malware.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
malware.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion malware.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion malware.exe -
Processes:
resource yara_rule behavioral1/memory/1984-10-0x0000000140000000-0x0000000140C5C000-memory.dmp themida behavioral1/memory/1984-9-0x0000000140000000-0x0000000140C5C000-memory.dmp themida -
Processes:
malware.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA malware.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
malware.exepid process 1984 malware.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
malware.exedescription pid process target process PID 1984 wrote to memory of 2068 1984 malware.exe WerFault.exe PID 1984 wrote to memory of 2068 1984 malware.exe WerFault.exe PID 1984 wrote to memory of 2068 1984 malware.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware.exe"C:\Users\Admin\AppData\Local\Temp\malware.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1984 -s 6042⤵PID:2068