Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 20:24
Behavioral task
behavioral1
Sample
b594d6121e59d1194c7f39e0166a46c9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b594d6121e59d1194c7f39e0166a46c9.exe
Resource
win10v2004-20240226-en
General
-
Target
b594d6121e59d1194c7f39e0166a46c9.exe
-
Size
1.4MB
-
MD5
b594d6121e59d1194c7f39e0166a46c9
-
SHA1
ea70f35cea39a16292db4db1bab73ecfec9b1b3f
-
SHA256
03e5f5529c62c94e1216b6fdb248c8e94fa1d28b4a1b2317df31c281423fb826
-
SHA512
ee606bb0dfd85de800fb305ec4c49a6d78a4e0d385666cb31092d95b8e8c7a566d23425a232391236a55b9bce8ed41e3308bd92ad780e954a818df24926c556d
-
SSDEEP
24576:+ndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkzzgsG/b:4XDFBU2iIBb0xY/6sUYY2g
Malware Config
Extracted
bitrat
1.38
185.244.36.230:1236
-
communication_password
4238f3388b8edda21e11f6cd3d4fd304
-
install_dir
discordHack
-
install_file
DiscordHack.exe
-
tor_process
tor
Signatures
-
Processes:
resource yara_rule behavioral1/memory/808-0-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral1/memory/808-1-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
b594d6121e59d1194c7f39e0166a46c9.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\DiscordHack = "C:\\Users\\Admin\\AppData\\Local\\discordHack\\DiscordHack.exe" b594d6121e59d1194c7f39e0166a46c9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
b594d6121e59d1194c7f39e0166a46c9.exepid process 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe -
Suspicious behavior: RenamesItself 30 IoCs
Processes:
b594d6121e59d1194c7f39e0166a46c9.exepid process 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b594d6121e59d1194c7f39e0166a46c9.exedescription pid process Token: SeDebugPrivilege 808 b594d6121e59d1194c7f39e0166a46c9.exe Token: SeShutdownPrivilege 808 b594d6121e59d1194c7f39e0166a46c9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
b594d6121e59d1194c7f39e0166a46c9.exepid process 808 b594d6121e59d1194c7f39e0166a46c9.exe 808 b594d6121e59d1194c7f39e0166a46c9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b594d6121e59d1194c7f39e0166a46c9.exe"C:\Users\Admin\AppData\Local\Temp\b594d6121e59d1194c7f39e0166a46c9.exe"1⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:808