Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2024 00:55

General

  • Target

    33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe

  • Size

    883KB

  • MD5

    cfb50900d157c73a0c99bf8ae447d957

  • SHA1

    8e41ff604483cf2e9076a0efd761024ac3f66831

  • SHA256

    33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f

  • SHA512

    ccbd36c7074712f2e7529d7e9ce0aaa4b496c6284fc5a1c35cda15c799d9db2b8064fbe7db1aae234db18687a0e9b1b08bdfc93555a5fdab4c814e7533e65143

  • SSDEEP

    24576:FGHCm8uPdJy+x3eo7kUewGIeAfjFb5p/+d:suWjetUPGPAH0

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxMTQ0NDk4MTAxMzAyMDc3Mg.Gz_2To.ddyZMlskW5IkWxvZKQxtRRzfz4cgw2XjE4yAu0

  • server_id

    1311378795281776650

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
    "C:\Users\Admin\AppData\Local\Temp\33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:280
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 280 -s 596
        3⤵
        • Loads dropped DLL
        PID:2840
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Trex.png

    Filesize

    373KB

    MD5

    22b463a63916485fd9109294e614a268

    SHA1

    34b3685199c007b7cf3f9ea65fbcebca7af4f7b9

    SHA256

    982bf30aff027c5b30815604d643bf4b2cd807aa51a5e557c0e0c52e58c61a7e

    SHA512

    2ab04755fa08cad07afaef0e3ba64eaee2177c6c9145beadacc020bdcb80941b33e8fa920497b50f2bf537f36b15c9438f63d90a63bc70351eba9bb5a774aa46

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe

    Filesize

    78KB

    MD5

    7d2b96a1886c76b42845b5b17d8f8834

    SHA1

    396987063ea768d305d5822b4682e2ab3a96bd9a

    SHA256

    9387875527976a33db416852acfcc15f6763f4850e8fdbeaf6aedc3089ef37a0

    SHA512

    31508f71a4a0b78fdd95556900aea1c892e6643a191468cbeb7cbc7425384360ce9a4441d649b441c11ab02512f798c13175e5a060481a4feef4f01844019d3d

  • memory/280-15-0x000000013F600000-0x000000013F618000-memory.dmp

    Filesize

    96KB

  • memory/2128-6-0x00000000024D0000-0x00000000024D2000-memory.dmp

    Filesize

    8KB

  • memory/2912-7-0x0000000000140000-0x0000000000142000-memory.dmp

    Filesize

    8KB

  • memory/2912-8-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2912-22-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB