Analysis
-
max time kernel
80s -
max time network
81s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
segzgpj.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
segzgpj.exe
Resource
win10v2004-20240802-en
General
-
Target
segzgpj.exe
-
Size
928KB
-
MD5
a30f489a124d3944db68ae2b8b86f44e
-
SHA1
0e1c7b0c81665bc6b7dd46ba35c3a2a4b1c9cffd
-
SHA256
9c2b448db764a47f1379aeddd6e0d59ef0325e0dd8d046cff5bdbe8c5c603d00
-
SHA512
9e7a548d48be22587ab111339f349af5823906a130d7767c9d5c22bca6f99a5f964922b8ae1812e9b0418b9bf70717ee2810bc69d5d6818adda6eef7eb14a15c
-
SSDEEP
24576:puDXTIGaPhEYzUzA0qhWWwZQ0TkRTuM8EAn40Q:MDjlabwz9hkRTMEk40Q
Malware Config
Extracted
discordrat
-
discord_token
MTI3MjIyMjI4MjUzNzg5NDAxMA.GNktU2.IT6BXomGu9aAgnt_KiuwO0plIJh1MHckpqtNV0
-
server_id
1272222756875800707
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation segzgpj.exe -
Executes dropped EXE 1 IoCs
pid Process 3540 backdoor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 discord.com 26 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3540 backdoor.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3424 wrote to memory of 3540 3424 segzgpj.exe 89 PID 3424 wrote to memory of 3540 3424 segzgpj.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\segzgpj.exe"C:\Users\Admin\AppData\Local\Temp\segzgpj.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c3615ce7c6222931aaecd07f106ce0fb
SHA1412b197ca471e2683c87a473d71286b6df52a923
SHA256eb55ccc760d23dcdd6f1d8e771deac145d21ecd2ec3f198ff063858b84919316
SHA51246e534ded7594e4c9bc0d7c847ca8e4322bd05e0943a6639c02c711e5785c9279dadc124be91aa2a7ebbe272aefd1cc2bcfb0a2a940c457807426dc95ce91890