Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 01:24
Behavioral task
behavioral1
Sample
Moon cheats/Moon Cheats.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Moon cheats/Moon Cheats.exe
Resource
win10v2004-20241007-en
General
-
Target
Moon cheats/Moon Cheats.exe
-
Size
78KB
-
MD5
23121ec5aa860121c4b03e246d919c4b
-
SHA1
750802101b7936c1f3f9140a8a5c8871d0c1d52f
-
SHA256
5068c095fe2dc0ea113802f0cfe1b2c733b9af3d26b56fe4640b84182dad3b00
-
SHA512
3dced9e61805d07e388d378f8fd6b8d0d099c878e05910dadf896440e5b79ca4d7f5404b8af734398678654aa8b55d0829b74e61b0771e9d9a5e1107d846425c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+ePIC:5Zv5PDwbjNrmAE+aIC
Malware Config
Extracted
discordrat
-
discord_token
MTMxMTU0ODcwMzk2NTg0MzUxNg.GIKoSl.hpLTnBEEtO8tJ-575ifZ73sv0H1AL_hR73OJxA
-
server_id
1311541606738038905
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2944 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid Process 2944 EXCEL.EXE 2944 EXCEL.EXE 2944 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Moon Cheats.exedescription pid Process procid_target PID 2640 wrote to memory of 2796 2640 Moon Cheats.exe 30 PID 2640 wrote to memory of 2796 2640 Moon Cheats.exe 30 PID 2640 wrote to memory of 2796 2640 Moon Cheats.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Moon cheats\Moon Cheats.exe"C:\Users\Admin\AppData\Local\Temp\Moon cheats\Moon Cheats.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2640 -s 5962⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2944
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:1552