Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:16
Static task
static1
Behavioral task
behavioral1
Sample
amg.jpg.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
amg.jpg.exe
Resource
win10v2004-20241007-en
General
-
Target
amg.jpg.exe
-
Size
577KB
-
MD5
aae034782a7817407e6f2539db1af529
-
SHA1
e8ef5aa3580f588af555df19bbc79da4fa3b6e3a
-
SHA256
9cf275aa00ea220c46208cb78644b875c9aedc05b8291594f815d3bafb37cf09
-
SHA512
6c8c776a0aaf6db95334d095776c03eef04508c61e7ad81094a0664b72b5c67fba695dd96c47db4fd030ee8fc7361408cff80a9f88f11ba1edbeb7270317e4aa
-
SSDEEP
12288:RyveQB/fTHIGaPkKEYzURNAwbAg8M2uaNZtfb/33zb9uHZjm:RuDXTIGaPhEYzUzA0qFZtzDJ4m
Malware Config
Extracted
discordrat
-
discord_token
MTI3Mzc4Nzg5NDkwMDk4MTc5MQ.GFavLP.EaJRoRwBcf74Z83FISIpZMktm2FL0XBkR_whPE
-
server_id
1273773393224663050
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
Processes:
Client-built.exepid Process 2160 Client-built.exe -
Loads dropped DLL 6 IoCs
Processes:
amg.jpg.exeWerFault.exepid Process 1700 amg.jpg.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe 2748 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
amg.jpg.exeClient-built.exedescription pid Process procid_target PID 1700 wrote to memory of 2160 1700 amg.jpg.exe 29 PID 1700 wrote to memory of 2160 1700 amg.jpg.exe 29 PID 1700 wrote to memory of 2160 1700 amg.jpg.exe 29 PID 2160 wrote to memory of 2748 2160 Client-built.exe 30 PID 2160 wrote to memory of 2748 2160 Client-built.exe 30 PID 2160 wrote to memory of 2748 2160 Client-built.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\amg.jpg.exe"C:\Users\Admin\AppData\Local\Temp\amg.jpg.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2160 -s 5963⤵
- Loads dropped DLL
PID:2748
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD58d26bcdfaff180cc1d24aa7d333699d7
SHA1bc3aba204d509f42eb47c80ede9b0b4abdb0006c
SHA2564225e867c3f9a8e7c0f68fbd88fcde1cbb5ed4f11cc00f072a119ef413d3afdb
SHA51261490f4f2aba391c8713b27583e283ec831c4ae980caf496d12af314e69618212c91a34f27bdedc272481423fc4d266bf3c29f226c9024ad1ca33fc274cc10f1