Analysis
-
max time kernel
275s -
max time network
267s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 06:58
Behavioral task
behavioral1
Sample
Screenshare.exe
Resource
win10v2004-20240221-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Screenshare.exe
Resource
win11-20240221-en
2 signatures
150 seconds
General
-
Target
Screenshare.exe
-
Size
78KB
-
MD5
70b3eeef461d8d7ecab87148bdc5da0b
-
SHA1
3f009f215e2fb8912b9a4e18e57f987187dae35d
-
SHA256
43d86b0fc95ce07b8f58b9563331ae8cc2cd2dd262630849f50d7627dddd2033
-
SHA512
67d3dcf3b96dca3d13a1e632939a68572079ec24fef8e97935d6ac88124d4f24c338e520a8e3182ee95f7823281c4d172e536170647c0ecb6b4520ad1fa563a4
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+M6PIC:5Zv5PDwbjNrmAE+MmIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTA0MDgyMTIzNDg2ODQzNzAyNw.GtcA8A.6TpBs-kYgoKXVc6Z9vKobut--ke0IH5N9tFS0g
-
server_id
1207140966327263283
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3952 Screenshare.exe Token: SeDebugPrivilege 4596 Screenshare.exe Token: SeDebugPrivilege 1628 Screenshare.exe Token: SeDebugPrivilege 2000 Screenshare.exe Token: SeDebugPrivilege 856 Screenshare.exe Token: SeDebugPrivilege 4420 Screenshare.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2300 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5044
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:856
-
C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"C:\Users\Admin\AppData\Local\Temp\Screenshare.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4420