Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 21:05

General

  • Target

    discord-rat-2024-main/prysmax.py

  • Size

    10KB

  • MD5

    c43f531577a5d0f33638b39ca77ff07d

  • SHA1

    efc0f7ad67fc2c293172cdbc17c0005fa0990d86

  • SHA256

    13d78b24f712d91281efe8827a21cd4c030c2048e166ab65fc215a8e004c5685

  • SHA512

    35484779b1968892e9c89128a9dd878fd7c1e012782fc839dad035b09c3d09112621d3daddc71143301fc791d76c1fe11e7aa3281be112e2acb8e2a6b952203f

  • SSDEEP

    96:V8QPZoxPMkc0Nu3Mlq4Fe9jrDKzF/qr4prD/tT/qr4ubudPul7Hx+j:GQ2mkKD9uF/qcxtT/qcOu+Lx+j

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\discord-rat-2024-main\prysmax.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord-rat-2024-main\prysmax.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord-rat-2024-main\prysmax.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2704

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          c106d2b3e9f46d20e4527e832a425668

          SHA1

          50251066aabd14e85ef6d098364852181a49065f

          SHA256

          52c30eed7111eb1ab5c0d16e66f38719664d0a5427cfc849bffb36e2be1afcff

          SHA512

          bde277f35cfa188308a1f57624219a123b5c8dc9767edd73bb66a5099b8e0103e413a8a5b7ea6092cec295daed576c0d3b0a782f99d7e01f421a830b5eed645f