Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 08:59
Behavioral task
behavioral1
Sample
74690cdf2edc26f42d100325241e1117.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
74690cdf2edc26f42d100325241e1117.exe
Resource
win10v2004-20241007-en
General
-
Target
74690cdf2edc26f42d100325241e1117.exe
-
Size
78KB
-
MD5
74690cdf2edc26f42d100325241e1117
-
SHA1
6905ea513cf4a9fcf94f5efff1933fdaf5e980f5
-
SHA256
520c9121e4236117c2784be4d856a7d819b5f614e6469a86edcceccacb9771d4
-
SHA512
1af915c6d421e5a3bb003985e513eaeb9a101a2006a2e338ae172da145ad98b2139bbca7e42a18b926ed7b489f6dcb347e85e6695f2f60ac7f80b0816110f255
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+LPIC:5Zv5PDwbjNrmAE+jIC
Malware Config
Extracted
discordrat
-
discord_token
MTIwMjY2NDA1NTE5ODg0NzAzNw.GBgvm-.FTCvKdBZdhUCywGcaCtSocdcqrjxGR0rEILNeA
-
server_id
1202543313526464574
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2528 wrote to memory of 804 2528 74690cdf2edc26f42d100325241e1117.exe 30 PID 2528 wrote to memory of 804 2528 74690cdf2edc26f42d100325241e1117.exe 30 PID 2528 wrote to memory of 804 2528 74690cdf2edc26f42d100325241e1117.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\74690cdf2edc26f42d100325241e1117.exe"C:\Users\Admin\AppData\Local\Temp\74690cdf2edc26f42d100325241e1117.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2528 -s 6002⤵PID:804
-