Resubmissions

15-08-2024 00:20

240815-am97fatfrb 10

05-08-2024 23:15

240805-281cxavhph 10

05-08-2024 23:13

240805-27gjeavhmc 10

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 23:15

General

  • Target

    Cute cat pic.exe

  • Size

    630KB

  • MD5

    830d47eb4e4d55d2b878856445fae249

  • SHA1

    4b80adef867d722fbff2bdede95f7043ebefd2da

  • SHA256

    85ad2e6790b045addec97dd7ac9d54e3e3995a259c7485f071041708ce57aadf

  • SHA512

    9196b47e92756584a70d930ae0f7a48f908cde8ba4762b578efd4545bf48b938c0685cbd372a19553f61f0559cadf5fac771a13d36d29fa2e98355bdb08e755b

  • SSDEEP

    12288:YyveQB/fTHIGaPkKEYzURNAwbAg+fmJNax9Jn2x7n:YuDXTIGaPhEYzUzA0KIs92V

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI3MDE1MTU0NDQyNzM4NDk2Mw.GgJHGv.V9KbKHSvwp2eqesQyx1XSS-pmcnaA8qOU-5WRw

  • server_id

    1270152842300100618

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cute cat pic.exe
    "C:\Users\Admin\AppData\Local\Temp\Cute cat pic.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2780 -s 596
        3⤵
        • Loads dropped DLL
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe

    Filesize

    78KB

    MD5

    f624b41f3700233cb0ee40676471eac6

    SHA1

    ab4673251f61de44051107c824467b3612e28aab

    SHA256

    3dff5f68acbd6683b25b3f5879c9fccc4ada096200e368c4b3fd00a957b9c1f6

    SHA512

    0e03cf987ce42bee44bd739bcfe957d6c041211b997d6951a84e651a08469b86b29d3ee21e1fae227058089c29c6fdfa465d73d5df547b97f9e2c9ed44286a0d

  • memory/1596-4-0x00000000031A0000-0x00000000031B0000-memory.dmp

    Filesize

    64KB

  • memory/2780-11-0x000007FEF4F13000-0x000007FEF4F14000-memory.dmp

    Filesize

    4KB

  • memory/2780-12-0x000000013F690000-0x000000013F6A8000-memory.dmp

    Filesize

    96KB

  • memory/2780-17-0x000007FEF4F10000-0x000007FEF58FC000-memory.dmp

    Filesize

    9.9MB

  • memory/2780-19-0x000007FEF4F10000-0x000007FEF58FC000-memory.dmp

    Filesize

    9.9MB