Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2024 00:55

General

  • Target

    33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe

  • Size

    883KB

  • MD5

    cfb50900d157c73a0c99bf8ae447d957

  • SHA1

    8e41ff604483cf2e9076a0efd761024ac3f66831

  • SHA256

    33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f

  • SHA512

    ccbd36c7074712f2e7529d7e9ce0aaa4b496c6284fc5a1c35cda15c799d9db2b8064fbe7db1aae234db18687a0e9b1b08bdfc93555a5fdab4c814e7533e65143

  • SSDEEP

    24576:FGHCm8uPdJy+x3eo7kUewGIeAfjFb5p/+d:suWjetUPGPAH0

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxMTQ0NDk4MTAxMzAyMDc3Mg.Gz_2To.ddyZMlskW5IkWxvZKQxtRRzfz4cgw2XjE4yAu0

  • server_id

    1311378795281776650

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
    "C:\Users\Admin\AppData\Local\Temp\33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4928
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe

    Filesize

    78KB

    MD5

    7d2b96a1886c76b42845b5b17d8f8834

    SHA1

    396987063ea768d305d5822b4682e2ab3a96bd9a

    SHA256

    9387875527976a33db416852acfcc15f6763f4850e8fdbeaf6aedc3089ef37a0

    SHA512

    31508f71a4a0b78fdd95556900aea1c892e6643a191468cbeb7cbc7425384360ce9a4441d649b441c11ab02512f798c13175e5a060481a4feef4f01844019d3d

  • memory/4012-16-0x00007FF929633000-0x00007FF929635000-memory.dmp

    Filesize

    8KB

  • memory/4012-17-0x0000025DC4D50000-0x0000025DC4D68000-memory.dmp

    Filesize

    96KB

  • memory/4012-18-0x0000025DDF350000-0x0000025DDF512000-memory.dmp

    Filesize

    1.8MB

  • memory/4012-19-0x00007FF929630000-0x00007FF92A0F1000-memory.dmp

    Filesize

    10.8MB

  • memory/4012-20-0x0000025DDFB50000-0x0000025DE0078000-memory.dmp

    Filesize

    5.2MB

  • memory/4012-21-0x00007FF929633000-0x00007FF929635000-memory.dmp

    Filesize

    8KB

  • memory/4012-22-0x00007FF929630000-0x00007FF92A0F1000-memory.dmp

    Filesize

    10.8MB