Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
segzgpj.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
segzgpj.exe
Resource
win10v2004-20240802-en
General
-
Target
segzgpj.exe
-
Size
928KB
-
MD5
a30f489a124d3944db68ae2b8b86f44e
-
SHA1
0e1c7b0c81665bc6b7dd46ba35c3a2a4b1c9cffd
-
SHA256
9c2b448db764a47f1379aeddd6e0d59ef0325e0dd8d046cff5bdbe8c5c603d00
-
SHA512
9e7a548d48be22587ab111339f349af5823906a130d7767c9d5c22bca6f99a5f964922b8ae1812e9b0418b9bf70717ee2810bc69d5d6818adda6eef7eb14a15c
-
SSDEEP
24576:puDXTIGaPhEYzUzA0qhWWwZQ0TkRTuM8EAn40Q:MDjlabwz9hkRTMEk40Q
Malware Config
Extracted
discordrat
-
discord_token
MTI3MjIyMjI4MjUzNzg5NDAxMA.GNktU2.IT6BXomGu9aAgnt_KiuwO0plIJh1MHckpqtNV0
-
server_id
1272222756875800707
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 3056 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2368 segzgpj.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe 2856 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2548 AUDIODG.EXE Token: 33 2548 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2548 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3056 2368 segzgpj.exe 31 PID 2368 wrote to memory of 3056 2368 segzgpj.exe 31 PID 2368 wrote to memory of 3056 2368 segzgpj.exe 31 PID 3056 wrote to memory of 2856 3056 backdoor.exe 32 PID 3056 wrote to memory of 2856 3056 backdoor.exe 32 PID 3056 wrote to memory of 2856 3056 backdoor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\segzgpj.exe"C:\Users\Admin\AppData\Local\Temp\segzgpj.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3056 -s 5963⤵
- Loads dropped DLL
PID:2856
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1548
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5981⤵
- Suspicious use of AdjustPrivilegeToken
PID:2548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c3615ce7c6222931aaecd07f106ce0fb
SHA1412b197ca471e2683c87a473d71286b6df52a923
SHA256eb55ccc760d23dcdd6f1d8e771deac145d21ecd2ec3f198ff063858b84919316
SHA51246e534ded7594e4c9bc0d7c847ca8e4322bd05e0943a6639c02c711e5785c9279dadc124be91aa2a7ebbe272aefd1cc2bcfb0a2a940c457807426dc95ce91890