Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
Nitropics.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Nitropics.exe
Resource
win10v2004-20241007-en
General
-
Target
Nitropics.exe
-
Size
429KB
-
MD5
e84293d6a10f5ae75563a71eaab55220
-
SHA1
5eb3a94e9f0d3a441daa5a1dd970a2ed1c0ff535
-
SHA256
0765a9b300832e96e9d4ddf0eb1fa784a05452e2a13d25d40d09533fc96f29d0
-
SHA512
4df885736d7af5c4d052a94d52db94fd5e08d21b8f7936159434ea401711f39f7a3ce07a6fcf7c9d80f612dc2a1b140d526f31efa74f55a435217a8ab56963b1
-
SSDEEP
6144:zE+yclwQKjdn+WPtYVJIoBfYzNMrS0lCtXDjkieP/JX8:zBdlwHRn+WlYV+5zOrS0ct8X/JM
Malware Config
Extracted
discordrat
-
discord_token
MTMxMzk2MDQ4MDUxOTQ4NzU5OA.Gz-ZjW.Wlf7dGd6VrMYY7Bl6OWOBm_VYm9E914JLkcVEI
-
server_id
1316139116815187969
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2300 Backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2016 Nitropics.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe 320 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nitropics.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2300 2016 Nitropics.exe 31 PID 2016 wrote to memory of 2300 2016 Nitropics.exe 31 PID 2016 wrote to memory of 2300 2016 Nitropics.exe 31 PID 2016 wrote to memory of 2300 2016 Nitropics.exe 31 PID 2300 wrote to memory of 320 2300 Backdoor.exe 32 PID 2300 wrote to memory of 320 2300 Backdoor.exe 32 PID 2300 wrote to memory of 320 2300 Backdoor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nitropics.exe"C:\Users\Admin\AppData\Local\Temp\Nitropics.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2300 -s 6003⤵
- Loads dropped DLL
PID:320
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5e5115c06aa67b01bd0c9458b699c7fac
SHA199fc0e0c5e1dcdc8485835824f65355e039c72b0
SHA256e67ad86cdaaeca8a2b9139a5b5afeffb4977f82cf522b72b75d8237527a37f7b
SHA512546a3f7486ace7dc4cbee5d8016dd2ed641a60770e1089688196fdd725c8bb473c9ec4ff8c916667619fe2e708205c3c557973cc68afea5a69060c6a07d35c1b