Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 00:03

General

  • Target

    Eac.exe

  • Size

    35KB

  • MD5

    d5affa7d70893d1d29f8d2d0e8e49499

  • SHA1

    0ffe0701303974ef2edd8638abf92a86648e1b68

  • SHA256

    fc4c55249b5a21fdc781db6f092f7a311524ff88db4751f7b3b5f70f66211fdc

  • SHA512

    7361d3ef71a514766538d9b17b6d3c21f4ace1c90a2b102d3729ac3844b72104621267445e162d54201b2341e2f2a7da0e791804b6c0804149fdd1152578044f

  • SSDEEP

    768:GhvFDyd1WrXkxINeeXJMmA2K3kqgjPQ1YeIqC33QBI:Wxyd87kxVeXJMmA2K3ktjwYeLB

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxODM5MDk2Mzc1NTk0NjEwNQ.GMbt-o.TS0FjWTfQgQvuTYGA3oI5R4a4Nq2WGb7J8TJCA

  • server_id

    1328216936206831626

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 15 IoCs
  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 12 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Eac.exe
    "C:\Users\Admin\AppData\Local\Temp\Eac.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:2544
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c "C:\Windows\Setup\7zip.exe" /S
      2⤵
        PID:1720
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" x "C:\Windows\Setup\Mapper.rar" -o"C:\Windows\Setup\Windows" -p123 -y
        2⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Windows\Setup\Windows\Pub.exe
        "C:\Windows\Setup\Windows\Pub.exe"
        2⤵
        • Executes dropped EXE
        PID:2460
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" x "C:\Windows\Setup\Pub.rar" -o"C:\Windows\Setup\Windows" -p123 -y
        2⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
      • C:\Windows\Setup\Windows\Built.exe
        "C:\Windows\Setup\Windows\Built.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1528
        • C:\Windows\Setup\Windows\Built.exe
          "C:\Windows\Setup\Windows\Built.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1284
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" x "C:\Windows\Setup\Windows Defender.rar" -o"C:\Windows\Setup\Windows" -p123 -y
        2⤵
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        PID:888
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe" x "C:\Windows\Setup\fontdrivehost.rar" -o"C:\Windows\system32" -p123 -y
        2⤵
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        PID:1564
      • C:\Windows\system32\fontdrivehost.exe
        "C:\Windows\system32\fontdrivehost.exe"
        2⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -u -p 2708 -s 604
          3⤵
          • Loads dropped DLL
          PID:2008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      71KB

      MD5

      83142242e97b8953c386f988aa694e4a

      SHA1

      833ed12fc15b356136dcdd27c61a50f59c5c7d50

      SHA256

      d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

      SHA512

      bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      5e02a54a4a7aa0646bfe994326bee60e

      SHA1

      876413a4a50cfb14f3f21112c0c25a7f645ac8ac

      SHA256

      236716d01b08ef8035e6a59e3d1d9050172ee890975b7c9aafbfc1882f95f264

      SHA512

      7182f8a4e2705e8f83c150f1900473241a0a614cc34154694223ddaf539d8410854c70c845d653588570faca2e7b4078fd9069d00925ae2bd607d81e2203266e

    • C:\Users\Admin\AppData\Local\Temp\CabCE97.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\TarCF98.tmp

      Filesize

      183KB

      MD5

      109cab5505f5e065b63d01361467a83b

      SHA1

      4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

      SHA256

      ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

      SHA512

      753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      1c58526d681efe507deb8f1935c75487

      SHA1

      0e6d328faf3563f2aae029bc5f2272fb7a742672

      SHA256

      ef13dce8f71173315dfc64ab839b033ab19a968ee15230e9d4d2c9d558efeee2

      SHA512

      8edb9a0022f417648e2ece9e22c96e2727976332025c3e7d8f15bcf6d7d97e680d1bf008eb28e2e0bd57787dcbb71d38b2deb995b8edc35fa6852ab1d593f3d1

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      724223109e49cb01d61d63a8be926b8f

      SHA1

      072a4d01e01dbbab7281d9bd3add76f9a3c8b23b

      SHA256

      4e975f618df01a492ae433dff0dd713774d47568e44c377ceef9e5b34aad1210

      SHA512

      19b0065b894dc66c30a602c9464f118e7f84d83010e74457d48e93aaca4422812b093b15247b24d5c398b42ef0319108700543d13f156067b169ccfb4d7b6b7c

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      517eb9e2cb671ae49f99173d7f7ce43f

      SHA1

      4ccf38fed56166ddbf0b7efb4f5314c1f7d3b7ab

      SHA256

      57cc66bf0909c430364d35d92b64eb8b6a15dc201765403725fe323f39e8ac54

      SHA512

      492be2445b10f6bfe6c561c1fc6f5d1af6d1365b7449bc57a8f073b44ae49c88e66841f5c258b041547fcd33cbdcb4eb9dd3e24f0924db32720e51651e9286be

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      d12403ee11359259ba2b0706e5e5111c

      SHA1

      03cc7827a30fd1dee38665c0cc993b4b533ac138

      SHA256

      f60e1751a6ac41f08e46480bf8e6521b41e2e427803996b32bdc5e78e9560781

      SHA512

      9004f4e59835af57f02e8d9625814db56f0e4a98467041da6f1367ef32366ad96e0338d48fff7cc65839a24148e2d9989883bcddc329d9f4d27cae3f843117d0

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\python311.dll

      Filesize

      1.6MB

      MD5

      bb46b85029b543b70276ad8e4c238799

      SHA1

      123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c

      SHA256

      72c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0

      SHA512

      5e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31

    • C:\Users\Admin\AppData\Local\Temp\_MEI15282\ucrtbase.dll

      Filesize

      992KB

      MD5

      0e0bac3d1dcc1833eae4e3e4cf83c4ef

      SHA1

      4189f4459c54e69c6d3155a82524bda7549a75a6

      SHA256

      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

      SHA512

      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

    • C:\Windows\Setup\Mapper.rar

      Filesize

      8.4MB

      MD5

      f71f2cfb88da09f9189152a136e2a73a

      SHA1

      32cfe27b688d40f9f5e6ad83b677a5bb11e2c774

      SHA256

      74b0e83103ac9c6dbf376c557e60cbb75ef14c2805af7aad387c83a55f908e9d

      SHA512

      cfda37b3c7d72cd14912c5bdbbf0cc459ad84431a6dd53cec8e69bdfddaba0fd393cb501bbe362474a1bcc645b438579226ab924814ce034a8dc5fdd91dc6f77

    • C:\Windows\Setup\Pub.rar

      Filesize

      7.5MB

      MD5

      66e659d033e32611f383d9b29953432b

      SHA1

      4c9f21ad2244656591b8c1aa0a81b7fd42278aa5

      SHA256

      86953b9c75edbf77c12d2307ee18d07f35e0067a3860f10e0702dd0205b6fb23

      SHA512

      3556d7263bcd442c8fea6ae6b562331bbc9fcabd948e108c91cfe72fb279f44ddce174d3ff130ab794926473916179ba0ec0e49401d23ddee5c287907d4d4d43

    • C:\Windows\Setup\Windows Defender.rar

      Filesize

      256KB

      MD5

      6872d940d990cb9253555f0b17e23022

      SHA1

      1ac72a9c302a064bd7746c8e79a2441410bf3706

      SHA256

      7eba13167ce5b6ef6862320bf14d8fa9b33a85a1ea3f718910372460be18e546

      SHA512

      6946d43aa67e3d5e83251e34c8a84ca91afb55c20c24afa90fef3d938ed641b86131bc14552b8861ca8e658889223b880c7c498b8787df65cf54888205824c11

    • C:\Windows\Setup\fontdrivehost.rar

      Filesize

      3.9MB

      MD5

      9e20d978775f346de27ec55dc091a952

      SHA1

      fe20bd0ae9e7a5b5367f7ffc04b4ca6a8951c733

      SHA256

      bc4b71621b6c225e5fca8d9b227c691b856164af79a08c51a747e177656bd548

      SHA512

      9a5c0f22641687745d1cdf3c637f3fab5248cb4b80c4f1bee02e5e1f8201ac5c13309b66039c0502d70585b08f87f941ec24509e84cc680f85ae4a09843a2db5

    • \Windows\Setup\Windows\Built.exe

      Filesize

      7.7MB

      MD5

      0dac6f3979353afe030ed5fd5a1d2804

      SHA1

      cfe4fab4f59d86c97bfea9a1448c0f5a7e59025d

      SHA256

      62182a243eab225e7e83c5187249137f2e768d14e53b7cac711b860f4a68abfe

      SHA512

      b94af303ae7c97f29e3a60e4f95e473b5c8cd5690028955b6afd3c8aee3561c20a9d5d982d73c71a00f37c914a31d4d5fe4d0302d09b59b90874be75f53a6784

    • \Windows\Setup\Windows\Pub.exe

      Filesize

      8.7MB

      MD5

      06a621ee6a8f12065b1ed848656b1d70

      SHA1

      cb6da87de8d58af02562d7f4380d6f1921d67234

      SHA256

      fb402bab58e2ee836e9707ca475292f4df8bc14fcbfe638e55efbe02ec0f1d27

      SHA512

      5d28f0df41daae34122d880f0122591cc954fa577ec2b150a1cfad8bf80cb35bc379ee82870ae14014f1fbe6cc798cc4dbdae9e7745e74228e02cf362104ae10

    • \Windows\System32\fontdrivehost.exe

      Filesize

      3.9MB

      MD5

      98bcde2d6a4f8a20cd81a473daad8b38

      SHA1

      8a095502dfa1df02b53b8caa106e34496b3c378d

      SHA256

      b8e525ff163b21c3d85358d1bdb7f6f7c8b4ff2cf9d6b7502a5beb925e7245b7

      SHA512

      b590e89391d8ba3c613097adf89cf475fc06a8926e2d762a866aed6fd29781e576ed42d1e415d8d2d1dc0abf6e1f494c658bd0e0d6614b5907ebfb4aabd660ae

    • memory/1284-219-0x000007FEF5E60000-0x000007FEF6448000-memory.dmp

      Filesize

      5.9MB

    • memory/2460-135-0x0000000140000000-0x0000000142264000-memory.dmp

      Filesize

      34.4MB

    • memory/2544-285-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB

    • memory/2544-296-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB

    • memory/2708-286-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB

    • memory/2708-289-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB

    • memory/2708-290-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB

    • memory/2708-298-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB

    • memory/2708-300-0x000000013FB10000-0x0000000140620000-memory.dmp

      Filesize

      11.1MB