Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
Nitropics.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Nitropics.exe
Resource
win10v2004-20241007-en
General
-
Target
Nitropics.exe
-
Size
429KB
-
MD5
e84293d6a10f5ae75563a71eaab55220
-
SHA1
5eb3a94e9f0d3a441daa5a1dd970a2ed1c0ff535
-
SHA256
0765a9b300832e96e9d4ddf0eb1fa784a05452e2a13d25d40d09533fc96f29d0
-
SHA512
4df885736d7af5c4d052a94d52db94fd5e08d21b8f7936159434ea401711f39f7a3ce07a6fcf7c9d80f612dc2a1b140d526f31efa74f55a435217a8ab56963b1
-
SSDEEP
6144:zE+yclwQKjdn+WPtYVJIoBfYzNMrS0lCtXDjkieP/JX8:zBdlwHRn+WlYV+5zOrS0ct8X/JM
Malware Config
Extracted
discordrat
-
discord_token
MTMxMzk2MDQ4MDUxOTQ4NzU5OA.Gz-ZjW.Wlf7dGd6VrMYY7Bl6OWOBm_VYm9E914JLkcVEI
-
server_id
1316139116815187969
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2720 Backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 1700 Nitropics.exe 468 WerFault.exe 468 WerFault.exe 468 WerFault.exe 468 WerFault.exe 468 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitropics.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2720 1700 Nitropics.exe 30 PID 1700 wrote to memory of 2720 1700 Nitropics.exe 30 PID 1700 wrote to memory of 2720 1700 Nitropics.exe 30 PID 1700 wrote to memory of 2720 1700 Nitropics.exe 30 PID 2720 wrote to memory of 468 2720 Backdoor.exe 31 PID 2720 wrote to memory of 468 2720 Backdoor.exe 31 PID 2720 wrote to memory of 468 2720 Backdoor.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nitropics.exe"C:\Users\Admin\AppData\Local\Temp\Nitropics.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2720 -s 5963⤵
- Loads dropped DLL
PID:468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5e5115c06aa67b01bd0c9458b699c7fac
SHA199fc0e0c5e1dcdc8485835824f65355e039c72b0
SHA256e67ad86cdaaeca8a2b9139a5b5afeffb4977f82cf522b72b75d8237527a37f7b
SHA512546a3f7486ace7dc4cbee5d8016dd2ed641a60770e1089688196fdd725c8bb473c9ec4ff8c916667619fe2e708205c3c557973cc68afea5a69060c6a07d35c1b