Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-02-2025 19:29
Static task
static1
Behavioral task
behavioral1
Sample
toystorylogo-4k.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
toystorylogo-4k.exe
Resource
win10v2004-20250129-en
General
-
Target
toystorylogo-4k.exe
-
Size
524KB
-
MD5
34ae0745931735f6af04adce8c1358d4
-
SHA1
825aabac462d7cdf80cd864a37e52175b2b78c0c
-
SHA256
4c56e50351c382dc82173c238228540ee12ecd399a8aab16d9bc49bfa4031e12
-
SHA512
5dc2f74cd7baad445650c57332a4c46462323635b40360915bc07dabfa69d9a4419528c4e4fd73efae59e68aa9220083ce5cbbcaa06c742eafc47f7350acdc43
-
SSDEEP
12288:3yveQB/fTHIGaPkKEYzURNAwbAg8j03rxuLrW:3uDXTIGaPhEYzUzA0qI3NuLrW
Malware Config
Extracted
discordrat
-
discord_token
MTMzNjA0MTEzNzYxNzc2NDUxNQ.GWUfuA.NHNO6tvAPM86NN4d9WM8wruyH3mk45GH-m19GM
-
server_id
1336040095018520668
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2808 xdbackdoor.exe -
Loads dropped DLL 6 IoCs
pid Process 2684 toystorylogo-4k.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe 2816 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2684 wrote to memory of 2808 2684 toystorylogo-4k.exe 31 PID 2684 wrote to memory of 2808 2684 toystorylogo-4k.exe 31 PID 2684 wrote to memory of 2808 2684 toystorylogo-4k.exe 31 PID 2808 wrote to memory of 2816 2808 xdbackdoor.exe 32 PID 2808 wrote to memory of 2816 2808 xdbackdoor.exe 32 PID 2808 wrote to memory of 2816 2808 xdbackdoor.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\toystorylogo-4k.exe"C:\Users\Admin\AppData\Local\Temp\toystorylogo-4k.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xdbackdoor.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xdbackdoor.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2808 -s 5963⤵
- Loads dropped DLL
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD52b0bb0b81b221965408bc75caf13f1e6
SHA13bf4b6917c1c6e943613507c8a15f2c0a504dd85
SHA2565cdcda478e5966aecc8b166f7899cc82e423ec3ff5af27061d1814b2cbe6c23e
SHA5122796ad2d3d5299df540684cc6b6c250915c5d7960e0015c506eac950c44cd6e0ebe8c1eef5f50badaa387f7f811c4ffb4179f19a6520ef2933becfd4480bf58a