Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 07:06

General

  • Target

    a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254.exe

  • Size

    724KB

  • MD5

    ac3ef2f121a0395e07e294763f4897f4

  • SHA1

    8e7d7022aba6b6a5909d9d9ac04ed1951f7f1ca6

  • SHA256

    a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254

  • SHA512

    14f68dd0e78b4e55d86787b3bbc3d334c61d0156602fffd79f441285a63b2fffbe7ea24c02d74f1cd62e1017d821c3bae0ac064e8b6653dc1c501d9067a117c1

  • SSDEEP

    12288:kyveQB/fTHIGaPkKEYzURNAwbAg8bxF04VsyDXmCfp6Ah+lcy/HQRMm8:kuDXTIGaPhEYzUzA0qUry7mCfp9h+lbH

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5NDUyNDAwNzYwOTAwODEyOQ.GCjW8M.SxCGlpfPNu5sW0K9sgiNhPHPY1UaaaQWEqijfk

  • server_id

    1294532251186364457

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254.exe
    "C:\Users\Admin\AppData\Local\Temp\a08c834c29d0d8f5f314a03f13775f4a5cd10537698551b4a74805eff7e45254.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3000
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3000 -s 596
        3⤵
        • Loads dropped DLL
        PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    3b6b4a5f94da14a520284e92c7ddd083

    SHA1

    5bc9b62a35892a8abcf65020b2d415c346fd1cdd

    SHA256

    ad40786f8d0934dae35cdcc8e60208143b969abdd3c085e03b47a60a37681ed5

    SHA512

    455e2a54ee291bda6235c538f2e497614e121d2f4a46d9aee8eafd1fc9bed44d82b70ea673a77ad0113d1405761566b1fa2c503611962c6359fc46c924c1ce7c

  • memory/1820-6-0x0000000002E50000-0x0000000002E60000-memory.dmp

    Filesize

    64KB

  • memory/3000-13-0x000007FEF66E3000-0x000007FEF66E4000-memory.dmp

    Filesize

    4KB

  • memory/3000-14-0x000000013F850000-0x000000013F868000-memory.dmp

    Filesize

    96KB

  • memory/3000-19-0x000007FEF66E0000-0x000007FEF70CC000-memory.dmp

    Filesize

    9.9MB

  • memory/3000-21-0x000007FEF66E0000-0x000007FEF70CC000-memory.dmp

    Filesize

    9.9MB