Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
MFjGBrO.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MFjGBrO.exe
Resource
win10v2004-20241007-en
General
-
Target
MFjGBrO.exe
-
Size
475KB
-
MD5
cbe2f2a631cafa3abf6169b419e84dc5
-
SHA1
20ac6d8060f99f16a92db8aa55ddfb7b2f2997c4
-
SHA256
f23839bc1f59d1cd4c542169e22882ac68063a169ae6f3e25e82b91c5e300b58
-
SHA512
0f879a83e08f43576786fc5e561c73e1eeec0799574e5ba3018b88b96b1abbd177385f7b0b3db3d97fdf1328ec2b0813223ab725915eb57774362f868a076d1f
-
SSDEEP
12288:byveQB/fTHIGaPkKEYzURNAwbAg8FvKIfKJzHj:buDXTIGaPhEYzUzA0qJKIfizHj
Malware Config
Extracted
discordrat
-
discord_token
MTMxMDkxODg1Mjk4ODc2NDE4MA.GzBXeG.IQdsANXf5vF4yFt_OatJlXeGmRVH0AzHFLzfHw
-
server_id
1310919517383294990
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 1644 back.exe.exe -
Loads dropped DLL 6 IoCs
pid Process 2288 MFjGBrO.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe 1816 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1644 2288 MFjGBrO.exe 29 PID 2288 wrote to memory of 1644 2288 MFjGBrO.exe 29 PID 2288 wrote to memory of 1644 2288 MFjGBrO.exe 29 PID 1644 wrote to memory of 1816 1644 back.exe.exe 30 PID 1644 wrote to memory of 1816 1644 back.exe.exe 30 PID 1644 wrote to memory of 1816 1644 back.exe.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\MFjGBrO.exe"C:\Users\Admin\AppData\Local\Temp\MFjGBrO.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\back.exe.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\back.exe.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1644 -s 5963⤵
- Loads dropped DLL
PID:1816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD53d44659c2dd4aa6c8dd0e21fd29769ab
SHA13e0724fc329780d69a92bd73919924f6234cd3fe
SHA2566795c0e852fa9d12ccd72e08bf0eb701a5f4f928cb72b6de61fe15d4a8fc20b1
SHA5121300172a2c87ec4d37db051f636c76042ace4556db84051ae61159e86f79acb4fd13268248bfe6b78198729b095a649a969a1e741d81e72fae9f1c29afcb41a3