Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 14:06
Behavioral task
behavioral1
Sample
PyrusC2.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
PyrusC2.exe
Resource
win10v2004-20240226-en
General
-
Target
PyrusC2.exe
-
Size
78KB
-
MD5
27f969d17693c222cdd0494cb2a09f80
-
SHA1
d5425670f1d1d40fb04a2a1c72dc7572a748a67a
-
SHA256
402d83a67acf9591aaf8dc4e62dcafc4dd10f3987cb7a175f0c288de77a86ad7
-
SHA512
33e8e65940074c84f24697ee6cc2654289419f02ca481033bf3c369f26fe4f16c3990a822fe0842f3feb2febe4cb8c57d8e3d1acc63d4c560e54ebe0806a42df
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+xPIC:5Zv5PDwbjNrmAE+hIC
Malware Config
Extracted
discordrat
-
discord_token
MTIxMzUwMTgyMzQxMTgyMjYzMg.G_3rn-.hlmdq27ziRAcKVZvZ9b7woSeSyqsovKDo0qouc
-
server_id
1200522482130632846
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2576 created 612 2576 PyrusC2.exe 5 -
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 18 IoCs
flow ioc 16 discord.com 73 discord.com 85 raw.githubusercontent.com 87 discord.com 83 discord.com 19 discord.com 47 discord.com 48 discord.com 71 raw.githubusercontent.com 72 raw.githubusercontent.com 74 discord.com 81 discord.com 33 discord.com 45 discord.com 46 discord.com 59 discord.com 58 discord.com 86 discord.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\Tasks\$77PyrusC2.exe svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 1840 2576 PyrusC2.exe 100 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1920 SCHTASKS.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 544 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2576 PyrusC2.exe 1840 dllhost.exe 1840 dllhost.exe 1840 dllhost.exe 1840 dllhost.exe 1840 dllhost.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 4016 Process not Found 1316 Process not Found 4696 Process not Found 3104 Process not Found 1756 Process not Found 1768 Process not Found 208 Process not Found 3876 Process not Found 3700 Process not Found 388 Process not Found 3100 Process not Found 4272 Process not Found 4952 Process not Found 4468 Process not Found 3364 Process not Found 540 Process not Found 1976 Process not Found 1808 Process not Found 2952 Process not Found 2264 Process not Found 4452 Process not Found 5076 Process not Found 1528 Process not Found 224 Process not Found 4672 Process not Found 4160 Process not Found 4608 Process not Found 4108 Process not Found 3172 Process not Found 1396 Process not Found 1492 Process not Found 552 Process not Found 4512 Process not Found 2216 Process not Found 4060 Process not Found 2400 Process not Found 4968 Process not Found 3912 Process not Found 1680 Process not Found 5032 Process not Found 632 Process not Found 4528 Process not Found 2904 Process not Found 1368 Process not Found 2284 Process not Found 3196 Process not Found 4480 Process not Found 1776 Process not Found 444 Process not Found 4236 Process not Found 3132 Process not Found 1616 Process not Found 4828 Process not Found 2032 Process not Found 4504 Process not Found 3424 Process not Found 1040 Process not Found 316 Process not Found 3652 Process not Found 1172 Process not Found 3352 Process not Found 1604 Process not Found 4592 Process not Found 3776 Process not Found -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2576 PyrusC2.exe Token: SeDebugPrivilege 2576 PyrusC2.exe Token: SeDebugPrivilege 1840 dllhost.exe Token: SeShutdownPrivilege 336 dwm.exe Token: SeCreatePagefilePrivilege 336 dwm.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2900 2576 PyrusC2.exe 93 PID 2576 wrote to memory of 2900 2576 PyrusC2.exe 93 PID 2900 wrote to memory of 544 2900 cmd.exe 95 PID 2900 wrote to memory of 544 2900 cmd.exe 95 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 2576 wrote to memory of 1840 2576 PyrusC2.exe 100 PID 1840 wrote to memory of 612 1840 dllhost.exe 5 PID 1840 wrote to memory of 668 1840 dllhost.exe 7 PID 1840 wrote to memory of 956 1840 dllhost.exe 12 PID 1840 wrote to memory of 336 1840 dllhost.exe 13 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 1840 wrote to memory of 716 1840 dllhost.exe 14 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 1840 wrote to memory of 580 1840 dllhost.exe 15 PID 2576 wrote to memory of 1920 2576 PyrusC2.exe 103 PID 2576 wrote to memory of 1920 2576 PyrusC2.exe 103 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 1840 wrote to memory of 536 1840 dllhost.exe 17 PID 668 wrote to memory of 2828 668 lsass.exe 51 PID 1840 wrote to memory of 1136 1840 dllhost.exe 18 PID 1840 wrote to memory of 1144 1840 dllhost.exe 19 PID 1840 wrote to memory of 1152 1840 dllhost.exe 20 PID 1840 wrote to memory of 1160 1840 dllhost.exe 21 PID 1840 wrote to memory of 1284 1840 dllhost.exe 22 PID 1840 wrote to memory of 1292 1840 dllhost.exe 23 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{12d82c86-e5bd-4b5b-b3f0-8a199874d963}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:716
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s DsmSvc1⤵PID:580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1136
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1284
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1292
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\PyrusC2.exe"C:\Users\Admin\AppData\Local\Temp\PyrusC2.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:544
-
-
-
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77PyrusC2.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\PyrusC2.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:1920
-
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1792
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3484
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3860
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:3404
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:1192
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2388