Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 08:21
Static task
static1
Behavioral task
behavioral1
Sample
nerdygpj.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
nerdygpj.exe
Resource
win10v2004-20241007-en
General
-
Target
nerdygpj.exe
-
Size
655KB
-
MD5
aa3de6b9ed16dc25882512643f5b5d6f
-
SHA1
5d6dac51c993d6d11502d9f6cb77e41f5dacd609
-
SHA256
724d531533e4a6b96dfcc3347069ee55dd542834f069b84dd2df5df60d2f912d
-
SHA512
9169a82e6e1268ad995b2b577e5a74882dfc1021693bd2b05cf0897bd357560faa22ceac4b144805a27bc8718c8c217c83280ecad09871ae8d83369e80cd79ae
-
SSDEEP
12288:lyveQB/fTHIGaPkKEYzURNAwbAg8VRdx0yEyraRxmqr:luDXTIGaPhEYzUzA0qfdx0yhrLW
Malware Config
Extracted
discordrat
-
discord_token
MTMzMjk4MTU1MzE2ODM4ODExNg.GEFbth.pkE5BLc6R0gzV4Q6-vvFbkxuMkkG0am3UW0Lkc
-
server_id
1332982186072342528
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2864 backdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 3004 nerdygpj.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2864 3004 nerdygpj.exe 31 PID 3004 wrote to memory of 2864 3004 nerdygpj.exe 31 PID 3004 wrote to memory of 2864 3004 nerdygpj.exe 31 PID 2864 wrote to memory of 2732 2864 backdoor.exe 32 PID 2864 wrote to memory of 2732 2864 backdoor.exe 32 PID 2864 wrote to memory of 2732 2864 backdoor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\nerdygpj.exe"C:\Users\Admin\AppData\Local\Temp\nerdygpj.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\backdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2864 -s 5963⤵
- Loads dropped DLL
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5e40126320a5f19f9a336982589efaebe
SHA14cc123220c3920bfe34451c579889989b0ee8b2c
SHA25694ca883fcaa9629609bb278db401d539b6ca6980a6979fe999ec96dce28756db
SHA5127cafde29ac2e0c55547f4c1a15aef9bdee2427fbd0ab753262883ac1df3bde543b7fad26cbc92d64c2db91ef825e903764ef0b071b3b7c6df76495816d7abe10