Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 22:15
Static task
static1
Behavioral task
behavioral1
Sample
14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe
Resource
win10v2004-20241007-en
General
-
Target
14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe
-
Size
761KB
-
MD5
71f5e9237f4f6d09e58095147d2bfeb8
-
SHA1
82059dd096fd1626fdd3dcd154e7cf3c0afffb52
-
SHA256
14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27
-
SHA512
03bda8b5316460c1c273719935968cd57a20a25ba7b80767da16210625fba656451bfc35c58908af5b48c7abbb49a97315a5e64c17b69002d34a0ef3f58c93a3
-
SSDEEP
12288:fzxzTDWikLSb4NS7H+7HX/OQvz/ZTKCbgA0IyuXX:dDWHSb4Nn7POsz/ZT5gFIycX
Malware Config
Extracted
discordrat
-
discord_token
MTIwNDYyNDM2OTY0OTg1MjUxOA.Gyboi1.3R0hC9ZYxTw5CzGRoFtSRbIV3eEcPNOM7wQf0E
-
server_id
1204622844772753458
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
Processes:
screenshot.exepid Process 2552 screenshot.exe -
Loads dropped DLL 6 IoCs
Processes:
14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exeWerFault.exepid Process 2672 14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe 2532 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DllHost.exe14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2656 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DllHost.exepid Process 2656 DllHost.exe 2656 DllHost.exe 2656 DllHost.exe 2656 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exescreenshot.exedescription pid Process procid_target PID 2672 wrote to memory of 2552 2672 14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe 32 PID 2672 wrote to memory of 2552 2672 14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe 32 PID 2672 wrote to memory of 2552 2672 14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe 32 PID 2672 wrote to memory of 2552 2672 14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe 32 PID 2552 wrote to memory of 2532 2552 screenshot.exe 33 PID 2552 wrote to memory of 2532 2552 screenshot.exe 33 PID 2552 wrote to memory of 2532 2552 screenshot.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe"C:\Users\Admin\AppData\Local\Temp\14ab1780c89dd769a95c964cc6bf152514034a2ffc55a4305ff5e71719b75c27.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2552 -s 5963⤵
- Loads dropped DLL
PID:2532
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5ba4a7fdf6765ee3b5db416cf299b6232
SHA173554c9408e5a05aa2304e9bf6ea3019cb6515d4
SHA25687552dfcdf29e0348ff57b6d5b6680916c04350f804a7d46fcb37f352164d7e8
SHA512fadd8a61b9df4049df1b680906607deda07a3e59ddbb4aa4cc8b31ef8b6898ab3ee1da0a7ec224be8f4d0c012ae8abf0b3ca99a82d05fc30640e43a13f224b91
-
Filesize
283KB
MD561a83f0d9735ef5c3e791b6276f2af88
SHA11ad8a991831c6e54cd3c0559a260cdb8a00080e9
SHA25663beccc8ba651113097146ad326e516d30e117bbd41162c304ed0165f239091c
SHA512e17565ff6c0ddb1f697d02b51e4cab19956a933ddf8ee458ced8a0f083ae16cb3b520c35a29daf81ac8817b624f95a652009011921806a52bf503370e704500f