Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 00:58
Static task
static1
Behavioral task
behavioral1
Sample
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
Resource
win10v2004-20241007-en
General
-
Target
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe
-
Size
883KB
-
MD5
cfb50900d157c73a0c99bf8ae447d957
-
SHA1
8e41ff604483cf2e9076a0efd761024ac3f66831
-
SHA256
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f
-
SHA512
ccbd36c7074712f2e7529d7e9ce0aaa4b496c6284fc5a1c35cda15c799d9db2b8064fbe7db1aae234db18687a0e9b1b08bdfc93555a5fdab4c814e7533e65143
-
SSDEEP
24576:FGHCm8uPdJy+x3eo7kUewGIeAfjFb5p/+d:suWjetUPGPAH0
Malware Config
Extracted
discordrat
-
discord_token
MTMxMTQ0NDk4MTAxMzAyMDc3Mg.Gz_2To.ddyZMlskW5IkWxvZKQxtRRzfz4cgw2XjE4yAu0
-
server_id
1311378795281776650
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
Processes:
Explorer.exepid Process 2428 Explorer.exe -
Loads dropped DLL 6 IoCs
Processes:
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exeWerFault.exepid Process 2536 33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exeDllHost.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
DllHost.exepid Process 1436 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
DllHost.exepid Process 1436 DllHost.exe 1436 DllHost.exe 1436 DllHost.exe 1436 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exeExplorer.exedescription pid Process procid_target PID 2536 wrote to memory of 2428 2536 33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe 31 PID 2536 wrote to memory of 2428 2536 33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe 31 PID 2536 wrote to memory of 2428 2536 33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe 31 PID 2536 wrote to memory of 2428 2536 33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe 31 PID 2428 wrote to memory of 2892 2428 Explorer.exe 32 PID 2428 wrote to memory of 2892 2428 Explorer.exe 32 PID 2428 wrote to memory of 2892 2428 Explorer.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe"C:\Users\Admin\AppData\Local\Temp\33e31fc2206536e98b2c63fe07cf9e862d355f339f39da22ce63e2b114a2971f.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Explorer.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2428 -s 5963⤵
- Loads dropped DLL
PID:2892
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD522b463a63916485fd9109294e614a268
SHA134b3685199c007b7cf3f9ea65fbcebca7af4f7b9
SHA256982bf30aff027c5b30815604d643bf4b2cd807aa51a5e557c0e0c52e58c61a7e
SHA5122ab04755fa08cad07afaef0e3ba64eaee2177c6c9145beadacc020bdcb80941b33e8fa920497b50f2bf537f36b15c9438f63d90a63bc70351eba9bb5a774aa46
-
Filesize
78KB
MD57d2b96a1886c76b42845b5b17d8f8834
SHA1396987063ea768d305d5822b4682e2ab3a96bd9a
SHA2569387875527976a33db416852acfcc15f6763f4850e8fdbeaf6aedc3089ef37a0
SHA51231508f71a4a0b78fdd95556900aea1c892e6643a191468cbeb7cbc7425384360ce9a4441d649b441c11ab02512f798c13175e5a060481a4feef4f01844019d3d