Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-11-2024 18:05
Static task
static1
Behavioral task
behavioral1
Sample
ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe
Resource
win10v2004-20241007-en
General
-
Target
ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe
-
Size
526KB
-
MD5
92bb43f6f8a760822a4c9dba73e6b48c
-
SHA1
e806fc23f2d36fef6ca27691958de54042d46115
-
SHA256
ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde
-
SHA512
e8bb117112702d37446e972373e89000d38c2e4ae60eb9cf6042de0b79f7b3f963327c0a4407e573ad02b87a23cd5244b167e2f655a5723ed9736221328f87d8
-
SSDEEP
12288:byveQB/fTHIGaPkKEYzURNAwbAg8gXD8hJWvL957N:buDXTIGaPhEYzUzA0q+D8hJILx
Malware Config
Extracted
discordrat
-
discord_token
MTI2Nzk0OTE4MzA2ODAxNjY4Mg.GloXQt.SglpUgV9VY8CpfcHZ0q4PtoqMh7uTBo72Ssxkc
-
server_id
1301935595399938108
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
Processes:
system32.exepid process 2440 system32.exe -
Loads dropped DLL 6 IoCs
Processes:
ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exeWerFault.exepid process 1656 ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe 2664 WerFault.exe 2664 WerFault.exe 2664 WerFault.exe 2664 WerFault.exe 2664 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exesystem32.exedescription pid process target process PID 1656 wrote to memory of 2440 1656 ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe system32.exe PID 1656 wrote to memory of 2440 1656 ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe system32.exe PID 1656 wrote to memory of 2440 1656 ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe system32.exe PID 2440 wrote to memory of 2664 2440 system32.exe WerFault.exe PID 2440 wrote to memory of 2664 2440 system32.exe WerFault.exe PID 2440 wrote to memory of 2664 2440 system32.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe"C:\Users\Admin\AppData\Local\Temp\ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2440 -s 5963⤵
- Loads dropped DLL
PID:2664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5969aef976f510fda3e48243cba5bc4a7
SHA1d4a34820041a3d97d1d9d8a472a539c4cbbe3f0d
SHA256b2e97beeda99d18067e4dfe48042c6cef48b5bcedf65e6a91bde519f75be14a9
SHA512834fcd840046636f7e2be008db8feada3cfd676ba3eba1282ec51caac89799d63e78c6d9fef71d8e3da88166847fe1548b5546b1e2a0a9b7dfc8c30df9efdc17