Analysis
-
max time kernel
117s -
max time network
100s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-01-2025 00:06
Behavioral task
behavioral1
Sample
release.zip
Resource
win11-20241007-en
General
-
Target
release.zip
-
Size
445KB
-
MD5
06a4fcd5eb3a39d7f50a0709de9900db
-
SHA1
50d089e915f69313a5187569cda4e6dec2d55ca7
-
SHA256
c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
-
SHA512
75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b
-
SSDEEP
12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQI:BKGo8EifSQwYWI
Malware Config
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 3 IoCs
pid Process 3148 builder.exe 2712 Discord rat.exe 4184 builder.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 72 7zFM.exe 72 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 72 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeRestorePrivilege 72 7zFM.exe Token: 35 72 7zFM.exe Token: SeSecurityPrivilege 72 7zFM.exe Token: SeSecurityPrivilege 72 7zFM.exe Token: SeDebugPrivilege 2712 Discord rat.exe Token: SeSecurityPrivilege 72 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 72 7zFM.exe 72 7zFM.exe 72 7zFM.exe 72 7zFM.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 72 wrote to memory of 3148 72 7zFM.exe 77 PID 72 wrote to memory of 3148 72 7zFM.exe 77 PID 72 wrote to memory of 3148 72 7zFM.exe 77 PID 72 wrote to memory of 2712 72 7zFM.exe 80 PID 72 wrote to memory of 2712 72 7zFM.exe 80 PID 72 wrote to memory of 4184 72 7zFM.exe 81 PID 72 wrote to memory of 4184 72 7zFM.exe 81 PID 72 wrote to memory of 4184 72 7zFM.exe 81
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\release.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:72 -
C:\Users\Admin\AppData\Local\Temp\7zO840D7D87\builder.exe"C:\Users\Admin\AppData\Local\Temp\7zO840D7D87\builder.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\7zO840F7258\Discord rat.exe"C:\Users\Admin\AppData\Local\Temp\7zO840F7258\Discord rat.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\7zO84027659\builder.exe"C:\Users\Admin\AppData\Local\Temp\7zO84027659\builder.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ac45cc773216001c355992d869450b47
SHA11f19c3839b521e1bf1ec7928f32f45234f38ea40
SHA256c9c03abe98c496376975747c9b617f5f6e1b50aec09aa8be31aa24e81254901f
SHA5123d73620a59089bc05d60ae07f0811ddacd1661599eca096cd9927813f86dc9cebac1de221691373601c743250694de43e408a9e607e813fb28260b1509f84574
-
Filesize
10KB
MD54f04f0e1ff050abf6f1696be1e8bb039
SHA1bebf3088fff4595bfb53aea6af11741946bbd9ce
SHA256ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
SHA51294713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12
-
Filesize
79KB
MD5d13905e018eb965ded2e28ba0ab257b5
SHA16d7fe69566fddc69b33d698591c9a2c70d834858
SHA2562bd631c6665656673a923c13359b0dc211debc05b2885127e26b0dce808e2dec
SHA512b95bfdebef33ac72b6c21cdf0abb4961222b7efd17267cd7236e731dd0b6105ece28e784a95455f1ffc8a6dd1d580a467b07b3bd8cb2fb19e2111f1a864c97cb