Analysis
-
max time kernel
125s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
04-04-2024 23:25
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20240319-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
26bbb735944110bb972f756f4ddf3043
-
SHA1
dc4b9bc259eae6e2844f544eccc77d25b55643b6
-
SHA256
97ffdc85eaf253b0bf73ff4c7218ba69c633163d68a8c81b1cca26d37413a2ec
-
SHA512
3f95f8606a340c3998cc28c136af6b700976328f66d21f8159baca1258978e9ce8d6568c1796ae2a5067b9a66c5134640c759e737ee2e77505fcad7873dde513
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+PPIC:5Zv5PDwbjNrmAE+3IC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIyNTU4MTkxODM5ODE4NTQ5NA.Gw9CZ8.yYe5hL8D8XiPvhntF1xwye-frottc7F_HntHW0
-
server_id
1222772434135158806
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2396 created 624 2396 Client-built.exe 5 -
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 150 discord.com 119 discord.com 120 discord.com 123 discord.com 126 discord.com 127 discord.com 147 raw.githubusercontent.com 148 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2396 set thread context of 4668 2396 Client-built.exe 116 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2396 Client-built.exe 2396 Client-built.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe 4668 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2396 Client-built.exe Token: SeDebugPrivilege 2396 Client-built.exe Token: SeDebugPrivilege 4668 dllhost.exe Token: SeShutdownPrivilege 388 dwm.exe Token: SeCreatePagefilePrivilege 388 dwm.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 2396 wrote to memory of 4668 2396 Client-built.exe 116 PID 4668 wrote to memory of 624 4668 dllhost.exe 5 PID 4668 wrote to memory of 676 4668 dllhost.exe 7 PID 4668 wrote to memory of 964 4668 dllhost.exe 12 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 4668 wrote to memory of 388 4668 dllhost.exe 13 PID 4668 wrote to memory of 724 4668 dllhost.exe 14 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 4668 wrote to memory of 1016 4668 dllhost.exe 16 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 4668 wrote to memory of 1072 4668 dllhost.exe 17 PID 4668 wrote to memory of 1088 4668 dllhost.exe 18 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 4668 wrote to memory of 1156 4668 dllhost.exe 19 PID 676 wrote to memory of 2668 676 lsass.exe 49 PID 4668 wrote to memory of 1204 4668 dllhost.exe 20 PID 4668 wrote to memory of 1240 4668 dllhost.exe 21 PID 4668 wrote to memory of 1324 4668 dllhost.exe 22 PID 4668 wrote to memory of 1392 4668 dllhost.exe 23 PID 4668 wrote to memory of 1432 4668 dllhost.exe 24 PID 4668 wrote to memory of 1460 4668 dllhost.exe 25 PID 4668 wrote to memory of 1476 4668 dllhost.exe 26 PID 4668 wrote to memory of 1616 4668 dllhost.exe 27 PID 4668 wrote to memory of 1632 4668 dllhost.exe 28 PID 4668 wrote to memory of 1672 4668 dllhost.exe 29
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:624
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:388
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{a30ba255-4df5-49af-a399-6ac2cb97f610}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:724
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1016
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1072
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1156
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1204
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1432
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1632
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1672
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:2820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4124 --field-trial-handle=2244,i,861925222566734100,5228329984880658054,262144 --variations-seed-version /prefetch:81⤵PID:4196