Analysis
-
max time kernel
244s -
max time network
245s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 06:25
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240226-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
f131e9a605657417a6d9ee4897236762
-
SHA1
e673c6da09e605351bd12c596292621ca1c1a063
-
SHA256
0cd8c108e213285ce93c085181e35a446d040b788338acab6ff8d02f9620a572
-
SHA512
cddeba715d9fb981f86d67449dc989c3472286ec97f3de2773f770582cdcea3071222fcd94d6286a2800b83fcb845001bac0175e664a1e7d8aa07e8dff70cb9e
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+APIC:5Zv5PDwbjNrmAE+kIC
Malware Config
Extracted
discordrat
-
discord_token
MTIxNjIxNTUyNTI4MjI4MzU4MA.GBK6jN.COZl9FTvEhXWGR_iVRAo7f9RXb-CLOQVgRSCWA
-
server_id
1216215871526277180
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4408 created 612 4408 Client-built.exe 5 -
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 23 IoCs
flow ioc 67 discord.com 71 discord.com 72 discord.com 8 discord.com 21 discord.com 51 discord.com 79 raw.githubusercontent.com 66 raw.githubusercontent.com 70 raw.githubusercontent.com 76 discord.com 74 discord.com 75 discord.com 77 raw.githubusercontent.com 80 discord.com 60 discord.com 68 discord.com 73 discord.com 78 discord.com 81 discord.com 82 discord.com 9 discord.com 52 discord.com 65 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4408 set thread context of 2632 4408 Client-built.exe 100 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3208 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4408 Client-built.exe 2632 dllhost.exe 2632 dllhost.exe 2632 dllhost.exe 2632 dllhost.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4408 Client-built.exe Token: 33 448 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 448 AUDIODG.EXE Token: SeDebugPrivilege 2632 dllhost.exe Token: SeDebugPrivilege 968 taskmgr.exe Token: SeSystemProfilePrivilege 968 taskmgr.exe Token: SeCreateGlobalPrivilege 968 taskmgr.exe Token: 33 968 taskmgr.exe Token: SeIncBasePriorityPrivilege 968 taskmgr.exe Token: SeShutdownPrivilege 4408 Client-built.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe -
Suspicious use of SendNotifyMessage 36 IoCs
pid Process 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe 968 taskmgr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 2632 4408 Client-built.exe 100 PID 4408 wrote to memory of 3208 4408 Client-built.exe 101 PID 4408 wrote to memory of 3208 4408 Client-built.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{6c37ee8c-4956-47e8-863d-a1407a1234cf}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Client-built.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Client-built.exe'" /sc onlogon /rl HIGHEST2⤵
- Creates scheduled task(s)
PID:3208
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3d4 0x2f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:448
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:968