Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-07-2024 18:45
Static task
static1
Behavioral task
behavioral1
Sample
antongpj.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
antongpj.exe
Resource
win10v2004-20240709-en
General
-
Target
antongpj.exe
-
Size
452KB
-
MD5
bad8e03a0e1cfe746fb77f73ec5042ae
-
SHA1
4f3bc64ed1e39a3c7e9215a4bd35072052e2a831
-
SHA256
09f62ca9ce707a10e1cc29c4e857ae8e38defa05d0f8cc0cad4f84022d6c5b4b
-
SHA512
162e101e05314cb67e855f15fbc4650f909e5df0da8dd13cdb2c1c4d0f7aa1200e705d35fd6f9ab3fb3c7d361994835bdb6cf16f1e3415ccceffe87ca2641ba2
-
SSDEEP
6144:2E9yzJpeQF2ZcbTzHznY8XHyldgaPGr++7+EK/zJDi3RC4AQNMIoYrmLU8YchJtd:PyveQB/fTHIGaPkKEYzURNAwbAg8YchB
Malware Config
Extracted
discordrat
-
discord_token
MTI2MjQ3NTk0MjgzMjM3Mzc4MA.Gm3A78.SvvnKqIpnEdUSKBmPvoekRlb-Nq9n0i0njcYUY
-
server_id
1262476292713087037
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2884 client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 2120 antongpj.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2884 2120 antongpj.exe 32 PID 2120 wrote to memory of 2884 2120 antongpj.exe 32 PID 2120 wrote to memory of 2884 2120 antongpj.exe 32 PID 2884 wrote to memory of 2568 2884 client-built.exe 33 PID 2884 wrote to memory of 2568 2884 client-built.exe 33 PID 2884 wrote to memory of 2568 2884 client-built.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\antongpj.exe"C:\Users\Admin\AppData\Local\Temp\antongpj.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2884 -s 5963⤵
- Loads dropped DLL
PID:2568
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5aaa6d8518ecd261b612b93ca39eba34c
SHA10ce021ca4d0586c5279cea4c1e10452d3d45038c
SHA256b2fcabcfa258a6fc509dba4787305e5b995e81f9180297490be1d5196aeb7756
SHA5122bf2df7055e67bed39f378601fd4de5bf6af2fe4711e3962ecc6f17348e27dcf6152d02b1253bdb89918586aa09e781cd6aadfc66dc3b9a68dc4603bdb986add