Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 22:19

General

  • Target

    68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe

  • Size

    977KB

  • MD5

    8ca2a2f8bf3712a6b5aae42f8d1f68a9

  • SHA1

    24f1b6863ce5c2c1f3a4c8b903225396c13c2e48

  • SHA256

    68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676

  • SHA512

    2ba0b7da5291db079342e64746f1c4cdc78eca563743afe0f07402b62ba7e207f748945a9d92c71fa593f28709830cd93f16c68373e89b9fbf4bccd8e4e5f672

  • SSDEEP

    24576:yHLmCiIhDFr4UhoNFhhX7D9pJcB40+rIU57eUUg90WbHXo:/m14UhoNFhhHp0+rFReFJKo

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTE4NzkxODczMDE4NTk0NTE0OA.G66vie.kA0nLo-eD-2rd6nK3M-Fh4qAb4220iowO4cbo4

  • server_id

    1187724075263598592

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe
    "C:\Users\Admin\AppData\Local\Temp\68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot_1.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot_1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3044 -s 596
        3⤵
        • Loads dropped DLL
        PID:1960
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ad.jpg

    Filesize

    473KB

    MD5

    1013d4611c68992b15be2adf40a50662

    SHA1

    67b8d52ef08743b48c1f3f451ebc1db2647d4016

    SHA256

    86f975a680bbead5334a639057a2ca178f797df760da3aa1a5a74de2dd98abc9

    SHA512

    1ef37dfa1522acef0a631d600ff573f22adfd044a9c54acfa76839726f6bddf496d1e1ff4e66730d3e6392dd3e1c546fcf5cfde2d016bb7cdb9978945d3007d0

  • \Users\Admin\AppData\Local\Temp\RarSFX0\screenshot_1.exe

    Filesize

    227KB

    MD5

    a41e2e60ab774a0ba32e020961f7bd8a

    SHA1

    33be7619ee3af09413f002137d7a0107b8645e4c

    SHA256

    02dcb098334f01d8ae526bed56624003e79ec8b5699e0944f8df723604e39d90

    SHA512

    80e41a828e97c2fe6604ae0732002adbfa34c7466bf36aa69763b06a3f0831fdb7ada05fdd03985f779662a9836709a3c7d246cc5a6199b9eb35463a6343858f

  • memory/2196-4-0x00000000006B0000-0x00000000006B2000-memory.dmp

    Filesize

    8KB

  • memory/2892-5-0x0000000000090000-0x0000000000092000-memory.dmp

    Filesize

    8KB

  • memory/2892-7-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/2892-20-0x00000000002E0000-0x00000000002E1000-memory.dmp

    Filesize

    4KB

  • memory/3044-13-0x000000013FEE0000-0x000000013FF1C000-memory.dmp

    Filesize

    240KB