Analysis

  • max time kernel
    103s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2025, 20:25

General

  • Target

    friegpj.exe

  • Size

    521KB

  • MD5

    fa686ae2f0713ae1b02296047ebcc87d

  • SHA1

    c07002d6a973789c28091495fc36e7ce1f2db93d

  • SHA256

    445e8e980c9ed096e55898149a625d436686b24d870c0ed08ae81b97ed4d5866

  • SHA512

    1ccb1877fe52a399a1dc4c2ac1de8c3f56772b13cd0bec053558fc90334bd291894b49f57120f0f9388431498df91be082ae5ac7bc18db3b5abc367d521f3f51

  • SSDEEP

    12288:ZyveQB/fTHIGaPkKEYzURNAwbAg8XIAVVsaz1J/CS:ZuDXTIGaPhEYzUzA0qpdzHaS

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTM2MTg0MjQwNDY2Mjk2ODQ0Mg.GbO_ZS.7BypD_7qCEnOjM1Bcz1ic7kfHpyO7HfeBvYCVY

  • server_id

    1361842784121782312

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\friegpj.exe
    "C:\Users\Admin\AppData\Local\Temp\friegpj.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4972

Network

MITRE ATT&CK Enterprise v16

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe

    Filesize

    78KB

    MD5

    f218c42ef38080b9cdeeefc930a9323e

    SHA1

    007cdb5163614a1de3fe6af210191e6ec53ae6e5

    SHA256

    7d76d3c6e37efdd8910316fccfbe5bff4cc745a192b71ed3e8aeda9517744a21

    SHA512

    fcd22e044fe66ac7881b0319ba01fb00f8cae89c5d933adbfe80ea2cd685c42ac79c06969626b2f1e0e1635291b7959c5744744f95f559d2c71f1e1df7d606cc

  • memory/4972-15-0x0000022C41230000-0x0000022C41248000-memory.dmp

    Filesize

    96KB

  • memory/4972-14-0x00007FFEFC7C3000-0x00007FFEFC7C5000-memory.dmp

    Filesize

    8KB

  • memory/4972-16-0x0000022C5B830000-0x0000022C5B9F2000-memory.dmp

    Filesize

    1.8MB

  • memory/4972-17-0x00007FFEFC7C0000-0x00007FFEFD281000-memory.dmp

    Filesize

    10.8MB

  • memory/4972-18-0x0000022C5CA20000-0x0000022C5CF48000-memory.dmp

    Filesize

    5.2MB

  • memory/4972-19-0x00007FFEFC7C0000-0x00007FFEFD281000-memory.dmp

    Filesize

    10.8MB