Analysis
-
max time kernel
91s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe
Resource
win10v2004-20241007-en
General
-
Target
b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe
-
Size
795KB
-
MD5
0f3d85879ca1dea6acd30e1222c53993
-
SHA1
0f16b8bb81f744d78002f11928c63cb1611bec57
-
SHA256
b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5
-
SHA512
ab73849179d520bb8719bcb772632f2310832f92a97aae99c8fe04acb721bcc3e4d0f0a16b90316a765d8883b42f26b72f4de1c945679035db5c2d34719da9a5
-
SSDEEP
24576:FGHCm8uPdJy+x3eWhJ7kUewGIeAfjFb5pI:suWjeW2UPGPAHW
Malware Config
Extracted
discordrat
-
discord_token
MTMxMTQ0NDk4MTAxMzAyMDc3Mg.Gz_2To.ddyZMlskW5IkWxvZKQxtRRzfz4cgw2XjE4yAu0
-
server_id
1311378795281776650
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 568 35e1y7i73e.exe -
Loads dropped DLL 6 IoCs
pid Process 1448 cmd.exe 1020 WerFault.exe 1020 WerFault.exe 1020 WerFault.exe 1020 WerFault.exe 1020 WerFault.exe -
pid Process 1176 certutil.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language certutil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1780 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1780 DllHost.exe 1780 DllHost.exe 1780 DllHost.exe 1780 DllHost.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2816 2748 b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe 31 PID 2748 wrote to memory of 2816 2748 b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe 31 PID 2748 wrote to memory of 2816 2748 b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe 31 PID 2748 wrote to memory of 2816 2748 b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe 31 PID 2816 wrote to memory of 1448 2816 WScript.exe 32 PID 2816 wrote to memory of 1448 2816 WScript.exe 32 PID 2816 wrote to memory of 1448 2816 WScript.exe 32 PID 2816 wrote to memory of 1448 2816 WScript.exe 32 PID 1448 wrote to memory of 1176 1448 cmd.exe 34 PID 1448 wrote to memory of 1176 1448 cmd.exe 34 PID 1448 wrote to memory of 1176 1448 cmd.exe 34 PID 1448 wrote to memory of 1176 1448 cmd.exe 34 PID 1448 wrote to memory of 568 1448 cmd.exe 35 PID 1448 wrote to memory of 568 1448 cmd.exe 35 PID 1448 wrote to memory of 568 1448 cmd.exe 35 PID 1448 wrote to memory of 568 1448 cmd.exe 35 PID 568 wrote to memory of 1020 568 35e1y7i73e.exe 36 PID 568 wrote to memory of 1020 568 35e1y7i73e.exe 36 PID 568 wrote to memory of 1020 568 35e1y7i73e.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe"C:\Users\Admin\AppData\Local\Temp\b427f4cc1ac1f00e3ad33e24676646560cf04aee44eeaefa2a9758a08a6f78a5.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Run.vbs"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c man.bat3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\certutil.execertutil -decode C:\Users\Admin\AppData\Local\Temp\35e1y7i73e.txt C:\Users\Admin\AppData\Local\Temp\35e1y7i73e.exe4⤵
- Deobfuscate/Decode Files or Information
- System Location Discovery: System Language Discovery
PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\35e1y7i73e.exeC:\Users\Admin\AppData\Local\Temp\35e1y7i73e.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 568 -s 5965⤵
- Loads dropped DLL
PID:1020
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD57d2b96a1886c76b42845b5b17d8f8834
SHA1396987063ea768d305d5822b4682e2ab3a96bd9a
SHA2569387875527976a33db416852acfcc15f6763f4850e8fdbeaf6aedc3089ef37a0
SHA51231508f71a4a0b78fdd95556900aea1c892e6643a191468cbeb7cbc7425384360ce9a4441d649b441c11ab02512f798c13175e5a060481a4feef4f01844019d3d
-
Filesize
105KB
MD5ceaeafc017a42635bbf53b04417ef508
SHA17d8ace57aeaf0aa6b61526429ab2658941444333
SHA2562684580741d138c06a1c0b7952f4120c390ff284bf66ed636408efa66b2329b5
SHA5124f67aa83f6ceb35892c802ed7faeaa8c0950285062d2096ac9949e40bc3a7cbc69bbf1a9f6c3774cfeb47d59c61256769c0cdc07eeb6876f638203b40847b84d
-
Filesize
5KB
MD5811fa6ed7ffca0fdfd174db6bf8bf48d
SHA1a8704aa986f418355574a372565fc5adaf9cfd67
SHA25609942b969cc3848ce94053c27f9f943186d213ca5ea5c95738b4181d6c58faf8
SHA5122b01b53ccddfcdff3cc82c3831436ab00ef1c1aca3a88f2b6490d7cd2fd3c3695c76389ea902493364dc0f97832ef93cf855f8a229224131c64acd36b9bd2288
-
Filesize
123B
MD519b182abe6109e7eff896828540fafda
SHA160bb82eedf097ab4c0a4d0d466938af74a2296a4
SHA2568d9e9a3a5bbdb640056a8d76167f99f601be0e68d92f2f2322b5366a2995369e
SHA512f1fbdb61c867853f99be8b12da1f5332b10cd25c3ed9f17e8a3afab60ecbfddfa9e84ffc8ae2dc8ec1505f326c4fde6f188a0ecd85f76739d6696dc945717e58
-
Filesize
373KB
MD522b463a63916485fd9109294e614a268
SHA134b3685199c007b7cf3f9ea65fbcebca7af4f7b9
SHA256982bf30aff027c5b30815604d643bf4b2cd807aa51a5e557c0e0c52e58c61a7e
SHA5122ab04755fa08cad07afaef0e3ba64eaee2177c6c9145beadacc020bdcb80941b33e8fa920497b50f2bf537f36b15c9438f63d90a63bc70351eba9bb5a774aa46
-
Filesize
107KB
MD57762dea18eb9af46c481c2f9c6466258
SHA11c4b7bc25c5c20db7df16b16a0454f364bcc1e83
SHA256de12124e2abf15f90a7375be74ad355f4555252ab332ddadcda3ada84aab4d87
SHA5125386111d663ec78ca02d9584d4337e4318e359f8087be9a20baa4c035b6889c1817ec7603053f2deac17daf5086da65b0517599144f379ab58b6d70484ab96bb