Analysis

  • max time kernel
    17s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-04-2024 13:45

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    95279ec42bbd666cfd0687d17afaa14f

  • SHA1

    1715de9c85f1377385cd9e9d03c24c1f98880b20

  • SHA256

    d5f965b39387c018ecb153d1573df2dcd4772ed64bc61eb5ffa2aca00c9fe058

  • SHA512

    e23fcd902fb3bfa168ea2f2370d8c112ebe7b6f69b84103b6b58b927710c4a409329d781e5209523ead7171b1ed0468533a5564902d56d5bb936270c5ff2ae5b

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+JPIC:5Zv5PDwbjNrmAE+5IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIyNTE2MjYyMzk2NDY4MDM2Ng.GhqsI6.zQNKyvLE0OxdAyNdfbB_zzCUQ4WNSRbzAQHH-A

  • server_id

    1225162463952109721

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2908
  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\StartSend.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2176-11-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-15-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-10-0x00007FFEC55B0000-0x00007FFEC55C0000-memory.dmp

    Filesize

    64KB

  • memory/2176-20-0x00007FFEC33F0000-0x00007FFEC3400000-memory.dmp

    Filesize

    64KB

  • memory/2176-18-0x00007FFEC33F0000-0x00007FFEC3400000-memory.dmp

    Filesize

    64KB

  • memory/2176-5-0x00007FFEC55B0000-0x00007FFEC55C0000-memory.dmp

    Filesize

    64KB

  • memory/2176-7-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-8-0x00007FFEC55B0000-0x00007FFEC55C0000-memory.dmp

    Filesize

    64KB

  • memory/2176-12-0x00007FFEC55B0000-0x00007FFEC55C0000-memory.dmp

    Filesize

    64KB

  • memory/2176-6-0x00007FFEC55B0000-0x00007FFEC55C0000-memory.dmp

    Filesize

    64KB

  • memory/2176-19-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-17-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-9-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-13-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-14-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2176-16-0x00007FFF05530000-0x00007FFF05725000-memory.dmp

    Filesize

    2.0MB

  • memory/2908-1-0x000001A6BB3C0000-0x000001A6BB582000-memory.dmp

    Filesize

    1.8MB

  • memory/2908-2-0x00007FFEE7340000-0x00007FFEE7E01000-memory.dmp

    Filesize

    10.8MB

  • memory/2908-21-0x00007FFEE7340000-0x00007FFEE7E01000-memory.dmp

    Filesize

    10.8MB

  • memory/2908-4-0x000001A6BBBC0000-0x000001A6BC0E8000-memory.dmp

    Filesize

    5.2MB

  • memory/2908-3-0x000001A6A11F0000-0x000001A6A1200000-memory.dmp

    Filesize

    64KB

  • memory/2908-0-0x000001A6A0D80000-0x000001A6A0D98000-memory.dmp

    Filesize

    96KB