Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-12-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
lorogpj.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
lorogpj.exe
Resource
win10v2004-20241007-en
General
-
Target
lorogpj.exe
-
Size
267KB
-
MD5
9c8961e727c152ca6f691f787ce38897
-
SHA1
7c60e45f98f354a417c938d35c0dc084fc2ec1c1
-
SHA256
75aca327fc11dc2c409578d1104c8274933cccfe5ac6c674c995e64a35570587
-
SHA512
1bdc71b6cd6feca4f1203a6d50ade4491166e87113f9c30c099097e9013f14825dd7e259e72f5866dc9f7a290a3cd0722d00ed631d106dc92b76fbd2ca0b812a
-
SSDEEP
6144:bXhaVAhAD4U5lbVHTKa9m2tZMEtnEuLxE0w6aIdlvLhff22Qer/:bxaVAh64U5lL9m2nMEtEj0w1IdlvFffF
Malware Config
Extracted
discordrat
-
discord_token
MTMxOTI4NTMyNjI3NTAyMjg0OA.GdpNdo.AKlmUueGdkM0K-nySfjXqoZsXhtK7dQiDHiOtk
-
server_id
1319285142543663187
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 1856 e.exe -
Loads dropped DLL 6 IoCs
pid Process 2692 lorogpj.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe 2608 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lorogpj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2700 DllHost.exe 2700 DllHost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2700 DllHost.exe 2700 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2692 wrote to memory of 1856 2692 lorogpj.exe 32 PID 2692 wrote to memory of 1856 2692 lorogpj.exe 32 PID 2692 wrote to memory of 1856 2692 lorogpj.exe 32 PID 2692 wrote to memory of 1856 2692 lorogpj.exe 32 PID 1856 wrote to memory of 2608 1856 e.exe 33 PID 1856 wrote to memory of 2608 1856 e.exe 33 PID 1856 wrote to memory of 2608 1856 e.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\lorogpj.exe"C:\Users\Admin\AppData\Local\Temp\lorogpj.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\e.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\e.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1856 -s 6003⤵
- Loads dropped DLL
PID:2608
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD51de390ceddcb7ed61661ff7374f5f7ba
SHA1f018a477c360a2ea23ded672a0354923e4cdba00
SHA25682dd113a6af6bff41604f7adc6bb588822c41191a4697d5530d782b4296407fb
SHA51209876aa4c324578133a9b9eefc484128177ddf80d19b4f92e580a34267fa2f170dde09635441c8cbff72274245f0b6d0c878db9f9bec5246a0c0331da84b0422
-
Filesize
78KB
MD523878f53a8fec67042bf248e55c01cf1
SHA1a7311ae7537bbc360419e54a51ab75d3ba366589
SHA2564aea1dd2c5418922e05c5c2979ef3aa7b0c114a31a0e8effb60e532444d5e969
SHA512f2a5a90f398363867445472fc2a65f0bd184a66eb623f0a41b4b046de8ab15c0175333b02ce254d2d3612a890f34ff35e898b0e658bff44fff138e280483d4fb