Analysis
-
max time kernel
164s -
max time network
184s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/02/2024, 10:39
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20231215-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
fec32f7900707eb511534e37ebf57347
-
SHA1
7599c0ca488d6db3017e4cf04ee98586a5893ab6
-
SHA256
2c74078bb1461d55e5f3f139e8459cecc70ea0dcb0ea02b08e704f8b0af4886d
-
SHA512
58b889f6b591da3846b82cbd8296d4189e712de534ccfdd9425aff7a327924a1d1e336e7ed2416aca39f2d5d8fc9acea355f51c9ea826a5dd1ecb73c3f7302b3
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WPIC:5Zv5PDwbjNrmAE+SIC
Malware Config
Extracted
discordrat
-
discord_token
MTIwMjU1OTMzMzUzMTkxNDI3Mg.GflOnq.Hg53bAVuaOhKXM3tfUpp2Zo70sjS9am5dejxjg
-
server_id
1202557859699888149
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 1 discord.com 3 discord.com 5 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3364 msedge.exe 3364 msedge.exe 2728 msedge.exe 2728 msedge.exe 2136 identity_helper.exe 2136 identity_helper.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1388 Client-built.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe 3364 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 1820 3364 msedge.exe 82 PID 3364 wrote to memory of 1820 3364 msedge.exe 82 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 1504 3364 msedge.exe 83 PID 3364 wrote to memory of 3260 3364 msedge.exe 85 PID 3364 wrote to memory of 3260 3364 msedge.exe 85 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84 PID 3364 wrote to memory of 4424 3364 msedge.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc22bb3cb8,0x7ffc22bb3cc8,0x7ffc22bb3cd82⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2516 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4516 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4544 /prefetch:12⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,14917248999402426161,18172067811669381709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5adfd6f09eacb7104a1985c8a0eb2b6a5
SHA19748ac00b72bf5551b7221ae68f1cdaf2d6b95f5
SHA25642e85a772e93ebe7c431c039aa9d777d56e7a44685f08ae3b2b4424af5b2fe43
SHA51242675ce4c9e9ab752529c1e3eeef16872124c917bfda7cdeb91751693d9b7d95597a855b3b8a779fa42c0c565567f15bbcda426c15e7801f558d47da05a322cd
-
Filesize
152B
MD592e040d7c1eeb7646714b53e4a95eb91
SHA14eaae5706d13b5f0ca9f2e4c994cfca63890dd7d
SHA2565342d5a6f08451e0f1c54f8e3658dd91eeba2be804f3582ddf8d6a4e2d0c6468
SHA512e5b4c0ee79b7536679bf2e54f865f91b4957d4f66e498a026b88a6c14a13163f897f54baa9da747c1523eaf20d29cca960b8949a08a7b0ab9b0bbe92478a34f8
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
Filesize
4KB
MD5d18b62afb3c4e4e2623e570f164a92bc
SHA12eacb0977de52077cfb3e3871342c23874d9c3e5
SHA2567fe6639da3d37018fa668bc5d15786371729c826386366a80103686830b6aeb9
SHA51294d8d4074715cdb5d8147c110cd67ccfa6b870c28f0d2f4316247f49599c0054aff22ccd22056df8313adb7a7c0dcff84d39483c2d36486dfcfec71e2df3d6d6
-
Filesize
5KB
MD5bd1591902906a115b20935a868cf8a38
SHA18a3379b5bbb10310d249b2985960d553ece26a55
SHA2562fa3be4c02083f00bf512aa7a91d1275336823862d21cb8f6fd592238bf4fcd5
SHA5127bc88e6f7d6b420c82c452c648e67de7bece15be6fadac61da35f474f9fcff0f9a1d3a182a069290f200ca9c94aa6768d21e1c48dbedf4f4c631e8ff2a75d49a
-
Filesize
5KB
MD563f5154095ab2833b33319d9e4261bc2
SHA194b3d0c4d22fa910fe40e716a71ce8407f7d19e3
SHA256978b853c5c5f09f5f8cb76ad9e2c43f607d2971ad0be2e6db603ebb8659acb83
SHA512d40ff0aac789cf3fb74962bd6861e7c6bdfe446881622e416c8140d9ee5f5d0b099760046c87d05a7185d4c8306186b5c3a5506dd55d192f8b32fd792da141e0
-
Filesize
25KB
MD558e2b179dbb10d049fe23616966bfb2a
SHA1b4f722b7e798fb6347837b51b05a4314a8219d84
SHA256cb934e662ce5441a1fec40f63ddb8b828d7cf0f4a532712907064b377d2777c4
SHA512ef3fbdd259151b0695369fae632106d190d2b9ac20b9854c5d2c23359ffde9469ea1736e7079264fd739ef3a214ac6ac8dbb9ab6c49184e5b5ebf9b8341c0c9b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD502eebd07236eb04115c46019811aa432
SHA158152a2999382b64dac952c2ab4ef7016bace954
SHA256000a9c5aebd609d5f69c7834a5bae4232ba94d8f68b45e1b2ab65e5947c9ca57
SHA5121e155f37aca1615692ea014ac8f50dd61c4098bb79cb47c1e340c96ab9532074c25f8ea15a76bdfde29620a208f9e587b136dac992877fda2fa8745648f9c61b