Analysis

  • max time kernel
    196s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/05/2023, 16:32

General

  • Target

    Discord.AIO.exe

  • Size

    6.5MB

  • MD5

    7adc6022bb09db5e263fb294aaab2566

  • SHA1

    77746a413c35573521c14eba036a2da5da68526a

  • SHA256

    54bb1a394197df666003cd83a607b364b373c32df999c51f3c14bb830fc776ee

  • SHA512

    21922589a3dc6fd2ccf4545dceb15249ca8882d946d9a29a90248dec55ed41b719d9d835381e0115a10d58957dbbc7ac3a277c2e1e88f398c672bed8e249a11a

  • SSDEEP

    98304:27w0WYwOYA4vWVU4fgcmnH3EPIL6yFs9u/FpboNe7mZD7JOu9mq2Jo2N/03FIgcG:ts4vkmXas+6cOGR2JFNmWZCZ

Score
10/10

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord.AIO.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord.AIO.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4812

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4812-133-0x00000000001D0000-0x000000000084A000-memory.dmp

          Filesize

          6.5MB

        • memory/4812-134-0x0000000005A40000-0x0000000005FE4000-memory.dmp

          Filesize

          5.6MB

        • memory/4812-135-0x00000000051D0000-0x0000000005262000-memory.dmp

          Filesize

          584KB

        • memory/4812-136-0x0000000005390000-0x000000000539A000-memory.dmp

          Filesize

          40KB

        • memory/4812-137-0x0000000005480000-0x0000000005490000-memory.dmp

          Filesize

          64KB

        • memory/4812-138-0x0000000005480000-0x0000000005490000-memory.dmp

          Filesize

          64KB

        • memory/4812-139-0x0000000005480000-0x0000000005490000-memory.dmp

          Filesize

          64KB

        • memory/4812-140-0x0000000005480000-0x0000000005490000-memory.dmp

          Filesize

          64KB