Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 09:49
Behavioral task
behavioral1
Sample
d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe
Resource
win10v2004-20240802-en
General
-
Target
d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe
-
Size
78KB
-
MD5
9785502cae1eebf9002fa3f3146be760
-
SHA1
1bc8d5fddf2c759fc93169bd83506d147ae3a299
-
SHA256
d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3
-
SHA512
b6c15e051f9475e943164e22573208c0c83de602076a886ca01d7d57953602d0b224483918767bd8e9c081e9b6a0470fbcc01da2840a5563dc34907b7e8acbb1
-
SSDEEP
1536:y2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+JPIU:yZv5PDwbjNrmAE+5IU
Malware Config
Extracted
discordrat
-
discord_token
MTI4NDU1ODUxNjEyMzg2NTE0MA.GveKlN.x3xl26HqDGR_hBn7Hb3SGlB5ofRg1fWNjjosEc
-
server_id
1284556619035836428
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2360 2972 d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe 30 PID 2972 wrote to memory of 2360 2972 d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe 30 PID 2972 wrote to memory of 2360 2972 d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe"C:\Users\Admin\AppData\Local\Temp\d4af8b9049c3577d0d2341cc97d6230469b8b54ddea1480c4a963d4ae85cffe3N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2972 -s 5962⤵PID:2360
-