Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-02-2025 01:06
Static task
static1
Behavioral task
behavioral1
Sample
isus.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
isus.exe
Resource
win10v2004-20250217-en
General
-
Target
isus.exe
-
Size
1.5MB
-
MD5
f7de6d9ea2041911a04ed9d0262d8ded
-
SHA1
23425e39470fbba504a4d4c0053d52bad6647c5f
-
SHA256
340e35785c40e2b1509d2ba4ba6e037239dba2e15429bdf52d5c1248b79b54fb
-
SHA512
6eab15cde24aad37d319941f8e0f64fadb5d6146004cf7f6705ca69b7b5d29324a03ed6b7e374ae22e05c0a322b60f9b0facedde112e8586d31aba4f3ab2f067
-
SSDEEP
24576:6ngHKYfXTkXy0ZJY3C4SHdvMJmCXZOG5UriaPsD679bPlmBkB1JmRZBR6WbMyxE:8gqKIXzEK9viXdariE79i0J63rxE
Malware Config
Extracted
discordrat
-
discord_token
MTM0MTkyOTg5MzE4OTEyODIwMw.GKmqhS.1YQpOG9bGfxiaoozOzdsFcGuCs4hj1VVEF_Cdo
-
server_id
1341930240167116860
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 2964 webhook.exe -
Loads dropped DLL 6 IoCs
pid Process 2280 isus.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe 2808 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2964 2280 isus.exe 30 PID 2280 wrote to memory of 2964 2280 isus.exe 30 PID 2280 wrote to memory of 2964 2280 isus.exe 30 PID 2964 wrote to memory of 2808 2964 webhook.exe 31 PID 2964 wrote to memory of 2808 2964 webhook.exe 31 PID 2964 wrote to memory of 2808 2964 webhook.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\isus.exe"C:\Users\Admin\AppData\Local\Temp\isus.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\webhook.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\webhook.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2964 -s 5963⤵
- Loads dropped DLL
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD53f86e2faf92a2c603f3bb8ffdc4c6fd4
SHA1795a747084411c87ded885253525b1aa1edc13d0
SHA256d0cb866aeb879c2216c2e3faeea147115eca89b160f067be64d61c7cbccfe65e
SHA5121b9c2e81e59bc82c9204deecf5ca94795fe92cce1a0d7b28353c45e25d0e7c008f48fe66c2c508c4c24f7dad7a827bcb48f1922e40116a35d30d6eb4769982c3