Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
CCleanerPrenium.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CCleanerPrenium.exe
Resource
win10v2004-20250314-en
General
-
Target
CCleanerPrenium.exe
-
Size
576KB
-
MD5
e3fbf000f0cb88f22399a9dc2ee979ed
-
SHA1
5159b6bdd26f852341efce2b1731805f9066b2f0
-
SHA256
399d5632b1f33414b80fd040ec4cdec4a4e008b700d1e41134aab794142a1695
-
SHA512
703d579fbbd7732dab0b81ec100d6296ce92e663ec8f1ef7b3d176fd296667ba6e734b60ffc83e4ae28062913b2c969a92de3bf4ff20af723242ccf620ff0b7d
-
SSDEEP
12288:/ngM8K8P4ElXddah8kyDIZqN4QMkn3J6Vj9b0X:/ngHKYfXTkXy0Zqaa3J490X
Malware Config
Extracted
discordrat
-
discord_token
MTM1MzgwODUxMjM2NjQxMTc5Ng.GO4sM5.j1mtJd6VCo06QnfdCJwfZCmRJYy7JZ_1Gz8_ic
-
server_id
1354644327229423779
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 1548 Client-built.exe -
Loads dropped DLL 6 IoCs
pid Process 1924 CCleanerPrenium.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe 3064 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1924 wrote to memory of 1548 1924 CCleanerPrenium.exe 31 PID 1924 wrote to memory of 1548 1924 CCleanerPrenium.exe 31 PID 1924 wrote to memory of 1548 1924 CCleanerPrenium.exe 31 PID 1548 wrote to memory of 3064 1548 Client-built.exe 32 PID 1548 wrote to memory of 3064 1548 Client-built.exe 32 PID 1548 wrote to memory of 3064 1548 Client-built.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\CCleanerPrenium.exe"C:\Users\Admin\AppData\Local\Temp\CCleanerPrenium.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1548 -s 5963⤵
- Loads dropped DLL
PID:3064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD55223b1db1fd416679a07c650ad548689
SHA13d3ab4134603e3a2c61270e0064749586534f75f
SHA2562d78b98bdae12e5954308982d478fe87fc96dad93dd33c117e120d65c3253ec4
SHA51259936f8d2dbae0cdef0be9df83872e127051ac34163e96eeac3e4efda4d9f1eb442cdab67a9f56830300b1fb8c671eafde35f301d0c6d19cbd449eaa06715c47