Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 06:13
Static task
static1
Behavioral task
behavioral1
Sample
e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe
Resource
win10v2004-20241007-en
General
-
Target
e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe
-
Size
653KB
-
MD5
b29ea93cfaae2ba95253379ed104b887
-
SHA1
1bbc44a5be1b47fa810932e23f89c561699b12a0
-
SHA256
e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370
-
SHA512
de1efd1015123415f7f701467e7d44b272588a0a6d0f8cef7fe3cdaa07edabb58e3ffa54af13f57fd46aad0094dfdd80e34eee963e280d4e12d7a6260029cb86
-
SSDEEP
12288:EyveQB/fTHIGaPkKEYzURNAwbAg1UlzC/OrE0lv71l:EuDXTIGaPhEYzUzA0BOrFx
Malware Config
Extracted
discordrat
-
discord_token
MTMxNzIxMzAwMzgxNjUwMTI1OA.GOxde6.qvLdHYSl6XVCI4Rb82L89AZW9W2eFIIV3Bv2gA
-
server_id
1317212558100267051
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2280 Puerta.exe -
Loads dropped DLL 6 IoCs
pid Process 2072 e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe 3032 WerFault.exe 3032 WerFault.exe 3032 WerFault.exe 3032 WerFault.exe 3032 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2280 2072 e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe 31 PID 2072 wrote to memory of 2280 2072 e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe 31 PID 2072 wrote to memory of 2280 2072 e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe 31 PID 2280 wrote to memory of 3032 2280 Puerta.exe 32 PID 2280 wrote to memory of 3032 2280 Puerta.exe 32 PID 2280 wrote to memory of 3032 2280 Puerta.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe"C:\Users\Admin\AppData\Local\Temp\e065095e64a2740805f1bd204910ddd3984140db6e0287a6896ba14f7b478370.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Puerta.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Puerta.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2280 -s 5963⤵
- Loads dropped DLL
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD55e62e33541e261796757002568244d4c
SHA1f63410ad05a494e2eda0ccc0c4723112968438f0
SHA2563f49b5258d58f497c3090a8e480e2945c19bd95cbd5e190689eff4d7d79b70b2
SHA51235b24160a0d3e3061ca4a85fa4d384814639981c9cbc28c0cbab4700ab4c41811a42a447da9e839eaaad50a05ac3d7ad5eb127d45dd774b320cecaf7990892b6