Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2024 05:44

General

  • Target

    hitler.exe

  • Size

    469KB

  • MD5

    aee98171c7978c9a97365da541479d77

  • SHA1

    cd2d1d42009d77a20e840494b79780bf0b4bbc2d

  • SHA256

    4a3039faf0def4395541ea3a4a2affd88b645c5385f5a9025cd28239e613b94e

  • SHA512

    adb761414b62ffdf516d3cd781e64e2dc449ad7bed5a51f2b63301f4db6e3c2678662dcc487e63e0a9b196d6f83e03b11069c730ee187631da550c46aa24902d

  • SSDEEP

    12288:LyveQB/fTHIGaPkKEYzURNAwbAg84inMJ6P:LuDXTIGaPhEYzUzA0qdncG

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5NTA4OTg3NTc5NTcwOTk2Mg.GnVjZo.5Vtl7OnWQwzVH8U1m6Q1yEtqw02OdG5o5V8N9o

  • server_id

    1295089763929297080

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\hitler.exe
    "C:\Users\Admin\AppData\Local\Temp\hitler.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2668 -s 596
        3⤵
        • Loads dropped DLL
        PID:2836

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe

    Filesize

    78KB

    MD5

    37f369fb2d4d2bc9588dae2b484391d8

    SHA1

    e2a2f594b69cd3dd3b5100055d630c74677983e3

    SHA256

    2f6bf57f657fb7e9e4d8566026a72b74f960fa5de661ccb1484ad4e52c6fcc11

    SHA512

    6b697caa8d5a7ba0dc12f87d73c48d8e8e571f304ce345fc8306c484d10ecb8be73cce48b0b62ad3fb7ba5055ea36727cb8304968718d8ad90ba29bc392c3076

  • memory/1056-6-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2668-13-0x000007FEF4EE3000-0x000007FEF4EE4000-memory.dmp

    Filesize

    4KB

  • memory/2668-14-0x000000013F020000-0x000000013F038000-memory.dmp

    Filesize

    96KB

  • memory/2668-19-0x000007FEF4EE0000-0x000007FEF58CC000-memory.dmp

    Filesize

    9.9MB

  • memory/2668-21-0x000007FEF4EE0000-0x000007FEF58CC000-memory.dmp

    Filesize

    9.9MB