Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-02-2025 09:38
Static task
static1
Behavioral task
behavioral1
Sample
7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe
Resource
win10v2004-20250129-en
General
-
Target
7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe
-
Size
391KB
-
MD5
ffd95f201b6b78245e7cb9586934f522
-
SHA1
aa85ccb2d05b9d5826f2ea3d189c5e1f78c24c8d
-
SHA256
7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3
-
SHA512
7f92a57b6cf942d6eaeab003f1bd05e55a5a66011aa22f4a902a3c1928ded90443946f5ad5c61c1baba12a28c29431520aaa3f00fe594983cbdb01c464b61967
-
SSDEEP
6144:7E+yclwQKjdn+WPtYVJIoBfYo/eyd8/tbrIQ7Oi9Ku:7BdlwHRn+WlYV+RVz/Nr17J
Malware Config
Extracted
discordrat
-
discord_token
MTMxNzUwNjY0NjkzMDYyMDQ5Ng.GNBK2Y.upogfQP8BcmxvUWnTPh9TiKyGPCxMpHGHpJtR0
-
server_id
1317507198582128671
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 792 rar.exe -
Loads dropped DLL 6 IoCs
pid Process 2016 7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2468 DllHost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2468 DllHost.exe 2468 DllHost.exe 2468 DllHost.exe 2468 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2016 wrote to memory of 792 2016 7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe 31 PID 2016 wrote to memory of 792 2016 7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe 31 PID 2016 wrote to memory of 792 2016 7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe 31 PID 2016 wrote to memory of 792 2016 7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe 31 PID 792 wrote to memory of 2760 792 rar.exe 32 PID 792 wrote to memory of 2760 792 rar.exe 32 PID 792 wrote to memory of 2760 792 rar.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe"C:\Users\Admin\AppData\Local\Temp\7c8eb8b61268aa05633afa7161190ee8ed57e80354ded18cb1062cd3a3c945c3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rar.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rar.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 792 -s 5963⤵
- Loads dropped DLL
PID:2760
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2468
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5606613cc1965ecf6ec7b42d94efcb2cd
SHA184e848b5958b7352b3c748bc56db99ea07eb23d2
SHA256b5f36538eb0dde089abec9b880c153d6216b8fdbc3941f3396ef6a68c105cad6
SHA512f876d6b0b02505fc835a7a048f90bdfd3ff31682a4e84acc58dbb4c4255be030c1bb8fbc7c822f6f6b9c46061fb4716bae9d98cff9217155a5cd841294e6ab7b
-
Filesize
78KB
MD5928b34327061b09e7e40759d04363eeb
SHA1a1e5715f0e0d054d654dcc6746b37c9a60f9ccfe
SHA256ea72c77769e394a017c08af3640c090d4216495d730f2612e8729d933589460c
SHA51262b8bd581583f872f4df5b2ffd999a31b6d98c6aa16ae522d02e2124995d5d4a4253e459b31af55abaaffd4e0d6bf373b5cc2b4b5269053994629f5ef82c2250