Analysis
-
max time kernel
839s -
max time network
839s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 03:03
Static task
static1
Behavioral task
behavioral1
Sample
Nitropicsgpj.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Nitropicsgpj.exe
Resource
win10v2004-20241007-en
General
-
Target
Nitropicsgpj.exe
-
Size
465KB
-
MD5
ae0671278c558993251145b11d811451
-
SHA1
509817db1f651ceb1e8a51f6fa15a244b1a31530
-
SHA256
09c5a6d42c50ec674dc6deacdf2e0a3d2767ea36a6b57f0f4dd70fe8aab84b66
-
SHA512
f23cb25ea577743fbbc7d14c5265ae90b1cd1ee6dbba3694e8274be6c188c2571d83c362984e22deb6ff9e902cdd3b8b251becafe1e19afb05cfcfe18fe2819f
-
SSDEEP
12288:bBdlwHRn+WlYV+5XQwmV4gxO+WH7YKkVnF:bBkVdlYA5gwmV4gxO+WH0FnF
Malware Config
Extracted
discordrat
-
discord_token
MTMxNTg2OTM0MzczMjQ2NTY5NA.GkK745.9MtESkOseU77lQKPBYHDluyVKPE-w0i6qkwHOo
-
server_id
1315868996016275477
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 1780 Backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2652 Nitropicsgpj.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe 2968 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitropicsgpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2496 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1780 2652 Nitropicsgpj.exe 32 PID 2652 wrote to memory of 1780 2652 Nitropicsgpj.exe 32 PID 2652 wrote to memory of 1780 2652 Nitropicsgpj.exe 32 PID 2652 wrote to memory of 1780 2652 Nitropicsgpj.exe 32 PID 1780 wrote to memory of 2968 1780 Backdoor.exe 33 PID 1780 wrote to memory of 2968 1780 Backdoor.exe 33 PID 1780 wrote to memory of 2968 1780 Backdoor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nitropicsgpj.exe"C:\Users\Admin\AppData\Local\Temp\Nitropicsgpj.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1780 -s 5963⤵
- Loads dropped DLL
PID:2968
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD525f8fbe6b5fdbbba848ae86b558e38f6
SHA1f57a36422275e212839c12647f37cb5b5f019e69
SHA25607cebe4e515855cd605205b113ec1e7f5122f84d24129572fe05f7885541e396
SHA5127eba3fff3d2b2d50dd7a4c3b5abd23318eac6d0ccf4fa8bfc920728db019f6da17750dc31f15d2b6142d5be36c759c738c1ec337993b26557e3ecd634955f4a4
-
Filesize
78KB
MD57b9ea3b553fb5a689c1ba4e634c40943
SHA12d0b6dcfd0e0bdad725271e58d1771bad3e95a88
SHA2568618a4c62725911d760713dcbf33694ae26cd177aaac27cf38b495c638a40f4f
SHA512c92cc36f24d09d0f856c5d9bd23321168c2e34b63bf9b18cd3205a0301c05e054112b85483be8d5c0dc35dd23d6aca3c39d202a6f44c283f1829db29702c399e