Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-01-2025 23:58
Static task
static1
Behavioral task
behavioral1
Sample
Diavlo Cracked v1.0.sfx.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Diavlo Cracked v1.0.sfx.exe
Resource
win10v2004-20241007-en
General
-
Target
Diavlo Cracked v1.0.sfx.exe
-
Size
712KB
-
MD5
9ed59258f3437ce25fb12958e7b6659b
-
SHA1
fb14154b9a4d71acfaec97cd7b5a16ff652ab238
-
SHA256
8e40d8098968b68553e64e7aeb0472cd5f3c0a1dfde2c1a7afbdb5a9266de7f5
-
SHA512
d429a5e51dea517136840384879c75c14687e7a09754c4f6292c136a6f1373b925c6c3bf2c4ed4071b353133c33e77b46d82844a609b0f42b9e0becb7f34ca58
-
SSDEEP
12288:XyveQB/fTHIGaPkKEYzURNAwbAgpLR7jXQA1RGLR7jXQA1RyuvvZuGWS:XuDXTIGaPhEYzUzA0lrX+rXyuXZu5S
Malware Config
Extracted
discordrat
-
discord_token
MTMzMDQyNzc0NDMwMzA1ODk4NQ.Gqsa3L.Aay15LBm9ibVIJIgj7zi5jAN3qGYkC0Aw2lPS0
-
server_id
1333947338598649967
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2872 Diavlo Cracked v1.0.exe -
Loads dropped DLL 8 IoCs
pid Process 1284 Diavlo Cracked v1.0.sfx.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 1216 Process not Found 1216 Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main Diavlo Cracked v1.0.sfx.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1284 Diavlo Cracked v1.0.sfx.exe 1284 Diavlo Cracked v1.0.sfx.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2872 1284 Diavlo Cracked v1.0.sfx.exe 28 PID 1284 wrote to memory of 2872 1284 Diavlo Cracked v1.0.sfx.exe 28 PID 1284 wrote to memory of 2872 1284 Diavlo Cracked v1.0.sfx.exe 28 PID 2872 wrote to memory of 2772 2872 Diavlo Cracked v1.0.exe 29 PID 2872 wrote to memory of 2772 2872 Diavlo Cracked v1.0.exe 29 PID 2872 wrote to memory of 2772 2872 Diavlo Cracked v1.0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\Diavlo Cracked v1.0.sfx.exe"C:\Users\Admin\AppData\Local\Temp\Diavlo Cracked v1.0.sfx.exe"1⤵
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\Desktop\Diavlo Cracked v1.0.exe"C:\Users\Admin\Desktop\Diavlo Cracked v1.0.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2872 -s 5963⤵
- Loads dropped DLL
PID:2772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5d5d1aa5140da480e3d02fad6fa03d4d8
SHA18f8e177b6de8da245d346c0b41142ea047e3ebaa
SHA256ba480eaeb51ae258cd4cc91b1ddd908e9a9d323b20d6ad439a665eb3906684e4
SHA512693e90be89b83a366388aa88a978d3c965c5d8519c36a5b74adf929cc60f490c5461f855f009831a8993b3616e51584915671d26d91e847d01eb3d3bced817e4