Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 04:14
Static task
static1
Behavioral task
behavioral1
Sample
built.sfx.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
built.sfx.exe
Resource
win10v2004-20250129-en
General
-
Target
built.sfx.exe
-
Size
550KB
-
MD5
9f845faa8d20bca0ad5b562c49984226
-
SHA1
5d9b152c9687f8f8e6359e5f9b3da34dc4ae1448
-
SHA256
0fc69c69c41de8a3a9b20b7387ebda3cd6948d25da1755c20404fdefdda53555
-
SHA512
eabcbf804b7090ad2a31af90e6072bbe86bc2d9870306dae2c4262b3588f042d4248591cc665d5167626403a5f6ced92dde7161e933aaecea08bc3b8323a3adb
-
SSDEEP
12288:NenOND3GsvSAQoReDhwAZbmajZk/f7SGqlJ6P:gnOlW8SnXFwAtmajGOGqiP
Malware Config
Extracted
discordrat
-
discord_token
MTMzNjE1MzM2MTU3MzIxNjM0Ng.G2Ga3O.6fY2Q_xGRBTkZD6yro26PYZ_j0hEJCFaIweb3k
-
server_id
1335778556487139340
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2224 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 1988 built.sfx.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe 2464 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2224 1988 built.sfx.exe 28 PID 1988 wrote to memory of 2224 1988 built.sfx.exe 28 PID 1988 wrote to memory of 2224 1988 built.sfx.exe 28 PID 2224 wrote to memory of 2464 2224 Client-built.exe 29 PID 2224 wrote to memory of 2464 2224 Client-built.exe 29 PID 2224 wrote to memory of 2464 2224 Client-built.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\built.sfx.exe"C:\Users\Admin\AppData\Local\Temp\built.sfx.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2224 -s 5963⤵
- Loads dropped DLL
PID:2464
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD56c0864d8ca1b0cf25ab4545840a9e339
SHA1dea1ab83bc0df17e21c88f24b32fd6b0a9ce5875
SHA2564091dd7fc28d7052fb2ca8c281d892a58ea4205216932ec743c3558f5ece7ef7
SHA51275fab26a7b118bc2ded2d50edb521ffe28713d8b1284f59809244b40bf983727ab122c42dfdaf98c5592527f8ac6039c59d910afa2468e0024e978bbce18b783