Analysis
-
max time kernel
119s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 22:02
Behavioral task
behavioral1
Sample
d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe
Resource
win10v2004-20241007-en
General
-
Target
d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe
-
Size
82KB
-
MD5
795ddbc2830d15090c9d7475d41ed808
-
SHA1
86135264474a64abe6eefbbb86d5e27507e6fbd2
-
SHA256
d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9
-
SHA512
48b263ea89d78bf6e5c2463f1cab0660908facdbdea88bb0308f4779fb82a124564e4012df61e4006c8baed980a8e25322b0ce65af28975644ed509a04e464b0
-
SSDEEP
1536:D2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+gPIU2:DZv5PDwbjNrmAE+EId
Malware Config
Extracted
discordrat
-
discord_token
MTE4NzkxODczMDE4NTk0NTE0OA.G66vie.kA0nLo-eD-2rd6nK3M-Fh4qAb4220iowO4cbo4
-
server_id
1187724075263598592
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exedescription pid Process procid_target PID 1852 wrote to memory of 1760 1852 d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe 30 PID 1852 wrote to memory of 1760 1852 d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe 30 PID 1852 wrote to memory of 1760 1852 d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe"C:\Users\Admin\AppData\Local\Temp\d14a609c0c3757f80eec5475e599dd2804763620290a21076905d290524231a9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1852 -s 5962⤵PID:1760
-