Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2024 19:03

General

  • Target

    ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe

  • Size

    526KB

  • MD5

    92bb43f6f8a760822a4c9dba73e6b48c

  • SHA1

    e806fc23f2d36fef6ca27691958de54042d46115

  • SHA256

    ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde

  • SHA512

    e8bb117112702d37446e972373e89000d38c2e4ae60eb9cf6042de0b79f7b3f963327c0a4407e573ad02b87a23cd5244b167e2f655a5723ed9736221328f87d8

  • SSDEEP

    12288:byveQB/fTHIGaPkKEYzURNAwbAg8gXD8hJWvL957N:buDXTIGaPhEYzUzA0q+D8hJILx

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2Nzk0OTE4MzA2ODAxNjY4Mg.GloXQt.SglpUgV9VY8CpfcHZ0q4PtoqMh7uTBo72Ssxkc

  • server_id

    1301935595399938108

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe
    "C:\Users\Admin\AppData\Local\Temp\ad085243fcf91d0898c71f4210270e518bb33a408a2685528f4c6d4eb22b3bde.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3032 -s 596
        3⤵
        • Loads dropped DLL
        PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RarSFX0\system32.exe

    Filesize

    78KB

    MD5

    969aef976f510fda3e48243cba5bc4a7

    SHA1

    d4a34820041a3d97d1d9d8a472a539c4cbbe3f0d

    SHA256

    b2e97beeda99d18067e4dfe48042c6cef48b5bcedf65e6a91bde519f75be14a9

    SHA512

    834fcd840046636f7e2be008db8feada3cfd676ba3eba1282ec51caac89799d63e78c6d9fef71d8e3da88166847fe1548b5546b1e2a0a9b7dfc8c30df9efdc17

  • memory/2220-4-0x00000000024A0000-0x00000000024B0000-memory.dmp

    Filesize

    64KB

  • memory/3032-11-0x000007FEF5F03000-0x000007FEF5F04000-memory.dmp

    Filesize

    4KB

  • memory/3032-12-0x000000013F4D0000-0x000000013F4E8000-memory.dmp

    Filesize

    96KB

  • memory/3032-13-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB

  • memory/3032-19-0x000007FEF5F00000-0x000007FEF68EC000-memory.dmp

    Filesize

    9.9MB