Analysis
-
max time kernel
70s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 17:35
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240226-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
9594ac941ec9890ab23e5bedf012ed7e
-
SHA1
8ed5b64424b987078d66386ab846b1310800a70c
-
SHA256
b443a47b136605e52aac37efa2c044a2d36e6a170b9e23d45e9abcaf0d6981a4
-
SHA512
3ccc8442828252eda27f681df25aecdd216bedf7b254c3f6e86f12c2633542d34ec0b15e086ce018db69f536a14c980ddf62811e9886e3b127838ff7a0e7474e
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+EPIC:5Zv5PDwbjNrmAE+YIC
Malware Config
Extracted
discordrat
-
discord_token
MTIxODI0OTk1OTE3NDk2NzM2NA.Guzhue.UC1DRHBdQqG38YVKc0APRt2tofgkq1ioeIpxi8
-
server_id
1218250144567263362
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 103 raw.githubusercontent.com 132 discord.com 133 discord.com 135 discord.com 20 discord.com 40 discord.com 56 discord.com 155 discord.com 19 discord.com 59 discord.com 105 raw.githubusercontent.com -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3192 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3164 Client-built.exe Token: SeDebugPrivilege 3164 Client-built.exe Token: SeShutdownPrivilege 3164 Client-built.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3164 wrote to memory of 3192 3164 Client-built.exe 104 PID 3164 wrote to memory of 3192 3164 Client-built.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Client-built.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Client-built.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3192
-