Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 22:19

General

  • Target

    68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe

  • Size

    977KB

  • MD5

    8ca2a2f8bf3712a6b5aae42f8d1f68a9

  • SHA1

    24f1b6863ce5c2c1f3a4c8b903225396c13c2e48

  • SHA256

    68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676

  • SHA512

    2ba0b7da5291db079342e64746f1c4cdc78eca563743afe0f07402b62ba7e207f748945a9d92c71fa593f28709830cd93f16c68373e89b9fbf4bccd8e4e5f672

  • SSDEEP

    24576:yHLmCiIhDFr4UhoNFhhX7D9pJcB40+rIU57eUUg90WbHXo:/m14UhoNFhhHp0+rFReFJKo

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTE4NzkxODczMDE4NTk0NTE0OA.G66vie.kA0nLo-eD-2rd6nK3M-Fh4qAb4220iowO4cbo4

  • server_id

    1187724075263598592

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe
    "C:\Users\Admin\AppData\Local\Temp\68aabd5eb17a4e1025b7e62cbcbc7714ab8f6d371842c7f1561fd62a86e82676.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:348
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot_1.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot_1.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\screenshot_1.exe

    Filesize

    227KB

    MD5

    a41e2e60ab774a0ba32e020961f7bd8a

    SHA1

    33be7619ee3af09413f002137d7a0107b8645e4c

    SHA256

    02dcb098334f01d8ae526bed56624003e79ec8b5699e0944f8df723604e39d90

    SHA512

    80e41a828e97c2fe6604ae0732002adbfa34c7466bf36aa69763b06a3f0831fdb7ada05fdd03985f779662a9836709a3c7d246cc5a6199b9eb35463a6343858f

  • memory/4876-14-0x00007FFDC3A73000-0x00007FFDC3A75000-memory.dmp

    Filesize

    8KB

  • memory/4876-15-0x0000014F660A0000-0x0000014F660DC000-memory.dmp

    Filesize

    240KB

  • memory/4876-16-0x0000014F80020000-0x0000014F801E2000-memory.dmp

    Filesize

    1.8MB

  • memory/4876-17-0x00007FFDC3A70000-0x00007FFDC4531000-memory.dmp

    Filesize

    10.8MB

  • memory/4876-18-0x0000014F00EE0000-0x0000014F01408000-memory.dmp

    Filesize

    5.2MB

  • memory/4876-19-0x00007FFDC3A73000-0x00007FFDC3A75000-memory.dmp

    Filesize

    8KB

  • memory/4876-20-0x00007FFDC3A70000-0x00007FFDC4531000-memory.dmp

    Filesize

    10.8MB