Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-12-2024 20:41

General

  • Target

    148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe

  • Size

    801KB

  • MD5

    7a876eea8b960edd0dd76c20f2ac80e0

  • SHA1

    e4368e08b6f72bf76426f16b446a7ca7cd60f753

  • SHA256

    148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721

  • SHA512

    300a74ffbe5c1cdf1f83c9396f72c2a36975338bd40a520a3421dc6325adf865d4bb9d0e75f29d6162e38e054287a0a9e3e61c0684193d9449cc86eddf9d4f54

  • SSDEEP

    12288:oCQjgAtAHM+vetZxF5EWry8AJGy0qxAzv4sPaMdQ/S80ZS20:o5ZWs+OZVEWry8AFrAb4sPBQEY20

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    OTUzNjY2MTA0NzE3MzY5MzQ0.GO4i8C.zDJ7JBYIXSLXHlJi5Yi6jwoHSErKVO_IQHRGWw

  • server_id

    954371492722933781

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe
    "C:\Users\Admin\AppData\Local\Temp\148b1a12f3b21c0ced93c01c612108c16128476f076d7e3bdae4c628cd3ce721.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1564
    • C:\Users\Admin\AppData\Local\Temp\legos.exe
      "C:\Users\Admin\AppData\Local\Temp\legos.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2580 -s 600
        3⤵
        • Loads dropped DLL
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\legos.exe

    Filesize

    78KB

    MD5

    65c3721a096da72b7cfe95c9af829e7e

    SHA1

    0127d9c53f5693ef0245a6976e3dc3c9a923c2fd

    SHA256

    358f1a2367cebf0a26d05656f50535f8ff9745eec9387f79b55d4d68a4dc64be

    SHA512

    3845fc34b9338fd11522f6176762bceb8601a048d41ab152650f8a6b697ba173bfec704261d0d70c64844b28d38ed6ce76b724ccbf758b557707e20f032d305f

  • memory/1564-4-0x0000000002220000-0x0000000002230000-memory.dmp

    Filesize

    64KB

  • memory/2580-17-0x000007FEF55E0000-0x000007FEF5FCC000-memory.dmp

    Filesize

    9.9MB

  • memory/2580-12-0x000000013F6E0000-0x000000013F6F8000-memory.dmp

    Filesize

    96KB

  • memory/2580-11-0x000007FEF55E3000-0x000007FEF55E4000-memory.dmp

    Filesize

    4KB

  • memory/2580-19-0x000007FEF55E0000-0x000007FEF5FCC000-memory.dmp

    Filesize

    9.9MB