Analysis
-
max time kernel
66s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 07:41
Static task
static1
Behavioral task
behavioral1
Sample
8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe
Resource
win10v2004-20241007-en
General
-
Target
8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe
-
Size
547KB
-
MD5
db19928cd25a3efc74a81b435de36463
-
SHA1
c1940aa2a37592933721ca88024fd693e79e3ab0
-
SHA256
8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1
-
SHA512
d1a519280d2005dec805dc3c843491e4648ad486e97e7435e1b6df2d7c1bef3aa79fca1a3cd3ea981335498cbc89fc685816977806b32d344fe80fb9e6cb972e
-
SSDEEP
12288:ayveQB/fTHIGaPkKEYzURNAwbAgsNQx8Y1G:auDXTIGaPhEYzUzA0S9YY
Malware Config
Extracted
discordrat
-
discord_token
MTMzMTg2NTY1MzkwNDE0NjQ1NA.GgU0HP.6F9E1xySezJEUN9opvXP8i_Oa8TOSRSKASDFts
-
server_id
1331866378998775881
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 1868 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 3064 8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe 2280 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1868 3064 8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe 30 PID 3064 wrote to memory of 1868 3064 8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe 30 PID 3064 wrote to memory of 1868 3064 8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe 30 PID 1868 wrote to memory of 2280 1868 backdoor.exe 31 PID 1868 wrote to memory of 2280 1868 backdoor.exe 31 PID 1868 wrote to memory of 2280 1868 backdoor.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe"C:\Users\Admin\AppData\Local\Temp\8154682cec02091222abfb10fcd7c36dc42ed49107c0f36802cc9b2ec4899cd1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1868 -s 5963⤵
- Loads dropped DLL
PID:2280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD50475f3686ab693d23099d6a6eb310e97
SHA13fbe7d3307f91adff72350823f4cbf4aa31d6e0f
SHA256633c32b80aaa5b6461455da0b80f5af374dfa8a21d611629bbd0c470b7f8a62f
SHA51266a3f1580ca7f5865dc2feaee72dac8ac87041f933e3606ca45904e07fa76a31d4b8e59d4ac55b90309ef70d42041e276cad1add001f92f45362d860c491b02c