Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-12-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe
Resource
win10v2004-20241007-en
General
-
Target
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe
-
Size
801KB
-
MD5
7a876eea8b960edd0dd76c20f2ac80e0
-
SHA1
e4368e08b6f72bf76426f16b446a7ca7cd60f753
-
SHA256
148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721
-
SHA512
300a74ffbe5c1cdf1f83c9396f72c2a36975338bd40a520a3421dc6325adf865d4bb9d0e75f29d6162e38e054287a0a9e3e61c0684193d9449cc86eddf9d4f54
-
SSDEEP
12288:oCQjgAtAHM+vetZxF5EWry8AJGy0qxAzv4sPaMdQ/S80ZS20:o5ZWs+OZVEWry8AFrAb4sPBQEY20
Malware Config
Extracted
discordrat
-
discord_token
OTUzNjY2MTA0NzE3MzY5MzQ0.GO4i8C.zDJ7JBYIXSLXHlJi5Yi6jwoHSErKVO_IQHRGWw
-
server_id
954371492722933781
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2580 legos.exe -
Loads dropped DLL 6 IoCs
pid Process 1564 148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2580 1564 148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe 30 PID 1564 wrote to memory of 2580 1564 148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe 30 PID 1564 wrote to memory of 2580 1564 148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe 30 PID 2580 wrote to memory of 2468 2580 legos.exe 31 PID 2580 wrote to memory of 2468 2580 legos.exe 31 PID 2580 wrote to memory of 2468 2580 legos.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe"C:\Users\Admin\AppData\Local\Temp\148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\legos.exe"C:\Users\Admin\AppData\Local\Temp\legos.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2580 -s 6003⤵
- Loads dropped DLL
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD565c3721a096da72b7cfe95c9af829e7e
SHA10127d9c53f5693ef0245a6976e3dc3c9a923c2fd
SHA256358f1a2367cebf0a26d05656f50535f8ff9745eec9387f79b55d4d68a4dc64be
SHA5123845fc34b9338fd11522f6176762bceb8601a048d41ab152650f8a6b697ba173bfec704261d0d70c64844b28d38ed6ce76b724ccbf758b557707e20f032d305f