Analysis
-
max time kernel
363s -
max time network
363s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 23:15
Static task
static1
Behavioral task
behavioral1
Sample
cleangnp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cleangnp.exe
Resource
win10v2004-20241007-en
General
-
Target
cleangnp.exe
-
Size
618KB
-
MD5
8b948933b21a7dd25cc33d9f6b3447c3
-
SHA1
0a8d15db88452a429b56f17e238ddce2a21b3f43
-
SHA256
77e7b02a53f97e11d03a6940fcc19a88ba209fc8b68808e2fe3c0af1ccf420b7
-
SHA512
7365e471018ea79830ce390bdb9be0fd35db7e70177b7cad7f9405986a748637ea91c11c2f32f252aa4ec1d884c611afdce00b800adc53252a4ec94bb6d53c61
-
SSDEEP
12288:nyveQB/fTHIGaPkKEYzURNAwbAg8Poc1Z8ussuYt7We8TFenrLSV0JsvC:nuDXTIGaPhEYzUzA0qwcuU8xenrV
Malware Config
Extracted
discordrat
-
discord_token
MTI5MzcwODM2NDc0ODE2MTAyNA.G0Wnp_.qVTNSpK-sScLmXdgwlSHCOmqRogcTbVxef1qu4
-
server_id
1293707853391204382
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2300 icon.exe -
Loads dropped DLL 6 IoCs
pid Process 2584 cleangnp.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2584 wrote to memory of 2300 2584 cleangnp.exe 31 PID 2584 wrote to memory of 2300 2584 cleangnp.exe 31 PID 2584 wrote to memory of 2300 2584 cleangnp.exe 31 PID 2300 wrote to memory of 2828 2300 icon.exe 32 PID 2300 wrote to memory of 2828 2300 icon.exe 32 PID 2300 wrote to memory of 2828 2300 icon.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\cleangnp.exe"C:\Users\Admin\AppData\Local\Temp\cleangnp.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\icon.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\icon.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2300 -s 6003⤵
- Loads dropped DLL
PID:2828
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD563544cc8cff3d6db6ac00399d20b8c77
SHA160cb0ae7613457fd97606d205e98af7bc066880f
SHA256690c32c72d0a9e0127376a4a7dfb561534dba9b1a8601bee3990231f13c88efd
SHA512865d7d12f58baf1a3f8f56f1551a2957dfa4d778c48f13487cf204015dc52e5cf278599ee3166b7ea190721ffc760f7c0f3713f646ded6c5a5e27b409e14d25e