Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe
Resource
win10v2004-20241007-en
General
-
Target
3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe
-
Size
312KB
-
MD5
206c5e9315996b26d6522aa75affdb5c
-
SHA1
618ad2c12f81a1a6520b8abfcbcada10bb18f353
-
SHA256
3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5
-
SHA512
d033501360cab478372d9738f0b1ea818bd4ee3de2f760623440696060e8f88e4e0775b7807ce979b77175c54fa5155d3fb23e8ddb11097ac7a4e959e98cff14
-
SSDEEP
6144:hIIcrXQ4S33w614mazUBHfSdocWYD24BfiDFinGTH8LR:/crNS33L10QdrX4fqinGALR
Malware Config
Extracted
discordrat
-
discord_token
MTMxOTg2OTgyOTM2MDEyODA3MQ.G49tLk.gKrl1f-9DXCakQDl5EQiEC-4rrMdZtmrIPsZ_M
-
server_id
1319869367160275024
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2712 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2372 3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2712 2372 3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe 30 PID 2372 wrote to memory of 2712 2372 3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe 30 PID 2372 wrote to memory of 2712 2372 3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe 30 PID 2372 wrote to memory of 2712 2372 3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe 30 PID 2712 wrote to memory of 2576 2712 backdoor.exe 31 PID 2712 wrote to memory of 2576 2712 backdoor.exe 31 PID 2712 wrote to memory of 2576 2712 backdoor.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe"C:\Users\Admin\AppData\Local\Temp\3bacfe46c94013a1ac4391aad3703b66c83c5f24b83988a20aa0688b75e38be5.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2712 -s 5963⤵
- Loads dropped DLL
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD50729e0a7bd07e3c627461aba5c4fdf3d
SHA17ed085a379bab804f36b991dedc263570e9cca8c
SHA2564587d63506c1ea2a973c09ed4ac7778911165143c111cece96c96bc6d0c8ac48
SHA512036a803c16d7936cc4a4c16817e49e57994d4558baadfb945222013018a687fa9656efe95027a597a9f064de3eaa4633b32b2fe5a71e8efb25de02ec130aeb08