Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 19:02
Static task
static1
Behavioral task
behavioral1
Sample
wise logo.gnp.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
wise logo.gnp.exe
Resource
win10v2004-20241007-en
General
-
Target
wise logo.gnp.exe
-
Size
231KB
-
MD5
1c896967e6be98ae74b73609217b6114
-
SHA1
fa667922c64647c9a7c750e22b9073ab85f84e6e
-
SHA256
96ffcd21b01c69b09029c9e4e70a2d6471ebbc4a2ed81478a5846083a4228aae
-
SHA512
08bfc53c47fe6574290b86633632c1efcd42cda7eba6378b3882786d54bd89d3794939fc03b87b8d315c6a55b19d5af6471331f5019a5f42d287d930ee09cd74
-
SSDEEP
6144:ea4InuJg58BkgqPoDH49n8Bb/cTOUXt8Wa:eat0EAH49n8BlUXyP
Malware Config
Extracted
discordrat
-
discord_token
MTMwMTA3ODQ3NjIyNDIwMDcwNQ.GG4U5v.q6f5p3v4QsFIwJGxfFjOIPRWeaaZORXwdiclGc
-
server_id
1300782121828356126
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
Processes:
RANDOM.exepid Process 2628 RANDOM.exe -
Loads dropped DLL 6 IoCs
Processes:
wise logo.gnp.exeWerFault.exepid Process 1696 wise logo.gnp.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
wise logo.gnp.exeDllHost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wise logo.gnp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 2036 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DllHost.exepid Process 2036 DllHost.exe 2036 DllHost.exe 2036 DllHost.exe 2036 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
wise logo.gnp.exeRANDOM.exedescription pid Process procid_target PID 1696 wrote to memory of 2628 1696 wise logo.gnp.exe 31 PID 1696 wrote to memory of 2628 1696 wise logo.gnp.exe 31 PID 1696 wrote to memory of 2628 1696 wise logo.gnp.exe 31 PID 1696 wrote to memory of 2628 1696 wise logo.gnp.exe 31 PID 2628 wrote to memory of 2672 2628 RANDOM.exe 32 PID 2628 wrote to memory of 2672 2628 RANDOM.exe 32 PID 2628 wrote to memory of 2672 2628 RANDOM.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\wise logo.gnp.exe"C:\Users\Admin\AppData\Local\Temp\wise logo.gnp.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\RANDOM.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\RANDOM.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2628 -s 6003⤵
- Loads dropped DLL
PID:2672
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5ef3f7488ad48935ffdad376477bc03e0
SHA13e0245eabeb7677bca5fb4de9b357c8b34810d4f
SHA256bce8a97e4a6ca3053e37c6b95a1a9ea038f898cf99fdea58d64052b9b84f5e9b
SHA5124aa01b013975b68d229517b88329029f6b48ef7624f16efcc5b92f6d78f2da4128d5de8ddbe4f24f4489180d4cf6dd3baf0e9a63b3b61fbaa24b7210341ddc8b
-
Filesize
78KB
MD5f5d0229427aaf6e148f74d7d5e922d5d
SHA1271b53ad7137098e78241e283e794203bb3e314a
SHA256c813931a3b3fab6421a6530dfb601fca767753ed20c3a6c91f1f1da128c9363d
SHA51255be1dc60537077e150c3f5745c297d62896df224ead5f80c8059b6e48ffca604f61a9e26e5d674e50bd0355c2a667b9a8471563f3d4051f6b679da47f14e3fa