Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 10:56
Static task
static1
Behavioral task
behavioral1
Sample
3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe
Resource
win10v2004-20241007-en
General
-
Target
3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe
-
Size
473KB
-
MD5
f0bd1b7ccbc18b1227e85ca2286030c6
-
SHA1
c2caafb0b8099017c1cab9614fa32f2fcea0308e
-
SHA256
3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54
-
SHA512
2490df4d8ecdb31fc5a34b82b6f3f4e6bd59c36b9e553c5b73757763bc57bdbfd86fc8a9874fcab9cb162f4e15a4a48ec833fbfa090541365b5b81006f32e66d
-
SSDEEP
12288:5CQjgAtAHM+vetZxF5EWry8AJGy0Bs+tGeJ1:55ZWs+OZVEWry8AFqcI
Malware Config
Extracted
discordrat
-
discord_token
MTMxODEwNzExMzIxNzcyMDM0MA.Gra180.ZB3ql0V1ISsfHNmIYjIAoYWHwYCVngKH7geZ5E
-
server_id
1314879064468754498
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2600 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2312 3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe 2572 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2312 wrote to memory of 2600 2312 3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe 31 PID 2312 wrote to memory of 2600 2312 3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe 31 PID 2312 wrote to memory of 2600 2312 3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe 31 PID 2600 wrote to memory of 2572 2600 backdoor.exe 32 PID 2600 wrote to memory of 2572 2600 backdoor.exe 32 PID 2600 wrote to memory of 2572 2600 backdoor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe"C:\Users\Admin\AppData\Local\Temp\3773543ac5af0235cd44c95ae28bbaec1ed1d8d6c7efeb4e728fc39506cdca54.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2600 -s 5963⤵
- Loads dropped DLL
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c1dd3be72fe23b81d9f027449411dadc
SHA1cfdf1a1cc5a4f669236925e5a95b45212f9c55a6
SHA256c2c44ed09535bc478c604f525a409d072b737f420bdbc7263aaeebd4d81dffce
SHA5128802d1c1fa2cdab19e0a6e0881d2819df3c2b0515c56658a5431a4fcd3288a6f3774e89180a1f375951d1579e88f060cfca036c91f572bf139fdd9826209bf4f