Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe
Resource
win10v2004-20241007-en
General
-
Target
3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe
-
Size
312KB
-
MD5
6105f3ca178dffdc8aa36e3dff7cb240
-
SHA1
5ef13cd04a4058f670b4af9625e3e4709fb1e5bb
-
SHA256
3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4
-
SHA512
40fe167b4960fc8d6d8ac6898950870d4a41e4660879ef220c64a9a13e9277ec60fea936140ee5670299816a2efcbd7cc6bf9f741d593f19554ef343d9a0bdcd
-
SSDEEP
6144:hIIcrXQ4S33w614mazUBHfSdocWYD24BfiDFinGTH8Lr:/crNS33L10QdrX4fqinGALr
Malware Config
Extracted
discordrat
-
discord_token
MTMxOTg2OTgyOTM2MDEyODA3MQ.G49tLk.gKrl1f-9DXCakQDl5EQiEC-4rrMdZtmrIPsZ_M
-
server_id
1319869367160275024
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2696 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 800 3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe 2528 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 800 wrote to memory of 2696 800 3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe 28 PID 800 wrote to memory of 2696 800 3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe 28 PID 800 wrote to memory of 2696 800 3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe 28 PID 800 wrote to memory of 2696 800 3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe 28 PID 2696 wrote to memory of 2528 2696 backdoor.exe 29 PID 2696 wrote to memory of 2528 2696 backdoor.exe 29 PID 2696 wrote to memory of 2528 2696 backdoor.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe"C:\Users\Admin\AppData\Local\Temp\3132f93211d109aa3f296f62f2b6a78c7188c580879d0567569c17fbec4df0d4N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2696 -s 5963⤵
- Loads dropped DLL
PID:2528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD50729e0a7bd07e3c627461aba5c4fdf3d
SHA17ed085a379bab804f36b991dedc263570e9cca8c
SHA2564587d63506c1ea2a973c09ed4ac7778911165143c111cece96c96bc6d0c8ac48
SHA512036a803c16d7936cc4a4c16817e49e57994d4558baadfb945222013018a687fa9656efe95027a597a9f064de3eaa4633b32b2fe5a71e8efb25de02ec130aeb08