Analysis
-
max time kernel
81s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 02:31
Static task
static1
Behavioral task
behavioral1
Sample
28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe
Resource
win10v2004-20241007-en
General
-
Target
28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe
-
Size
473KB
-
MD5
5c600a8f43d67d163bc2fb24c35f5cb0
-
SHA1
734c5d573050c4bf42e85f23ae8fd790752d422c
-
SHA256
28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1ae
-
SHA512
059f54b5805df5137cf6a9f95d72dc1d53d8c31652db4d7c4159ca2ee38f64f4041c5e1e2d664a014654258c0d3dc3282ada2b87d22e60b7a3fd1bb4c5706e95
-
SSDEEP
12288:5CQjgAtAHM+vetZxF5EWry8AJGy0Bs+tGeJ/:55ZWs+OZVEWry8AFqcI
Malware Config
Extracted
discordrat
-
discord_token
MTMxODEwNzExMzIxNzcyMDM0MA.Gra180.ZB3ql0V1ISsfHNmIYjIAoYWHwYCVngKH7geZ5E
-
server_id
1314879064468754498
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2120 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2392 28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe 1408 WerFault.exe 1408 WerFault.exe 1408 WerFault.exe 1408 WerFault.exe 1408 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2120 2392 28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe 32 PID 2392 wrote to memory of 2120 2392 28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe 32 PID 2392 wrote to memory of 2120 2392 28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe 32 PID 2120 wrote to memory of 1408 2120 backdoor.exe 33 PID 2120 wrote to memory of 1408 2120 backdoor.exe 33 PID 2120 wrote to memory of 1408 2120 backdoor.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe"C:\Users\Admin\AppData\Local\Temp\28d2206af1219a12a82425a1da1f5df9e15e0914dfe85499c97537154a25c1aeN.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2120 -s 5963⤵
- Loads dropped DLL
PID:1408
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c1dd3be72fe23b81d9f027449411dadc
SHA1cfdf1a1cc5a4f669236925e5a95b45212f9c55a6
SHA256c2c44ed09535bc478c604f525a409d072b737f420bdbc7263aaeebd4d81dffce
SHA5128802d1c1fa2cdab19e0a6e0881d2819df3c2b0515c56658a5431a4fcd3288a6f3774e89180a1f375951d1579e88f060cfca036c91f572bf139fdd9826209bf4f