Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 19:08

General

  • Target

    injector.exe

  • Size

    78KB

  • MD5

    997bc4ce7d58191913f386b62737e547

  • SHA1

    532ec6e768f92ba470673cd24f55458ca7104774

  • SHA256

    2334a4519ae1aa064e12b6484e5ba9e1e16063441be92420d2077f9acf0f04a3

  • SHA512

    1bdb5aa42f44ec2a9395621c7e0ea09784da8a503a6576236c82e12a36a74186104b857d400256c0122e86c000c476f0fa96379ea6ba119689979beae93867f2

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+OPIC:5Zv5PDwbjNrmAE+qIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIyNDA2MTAzMzQ4OTEwOTE0Mw.GG6OsM.gvmNCjFemn-m8sco5tZiTQhOWazT7Mq5aDarj8

  • server_id

    1227693529006997554

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\injector.exe
    "C:\Users\Admin\AppData\Local\Temp\injector.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:840
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault9fb5a272h3384h463eh8417h37a98fd3e494
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0x100,0x128,0x7ff84cd946f8,0x7ff84cd94708,0x7ff84cd94718
      2⤵
        PID:760
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,15498245071621188916,15553305033389993766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
        2⤵
          PID:544
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,15498245071621188916,15553305033389993766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4524
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,15498245071621188916,15553305033389993766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:8
          2⤵
            PID:892
        • C:\Windows\System32\CompPkgSrv.exe
          C:\Windows\System32\CompPkgSrv.exe -Embedding
          1⤵
            PID:2576
          • C:\Windows\System32\CompPkgSrv.exe
            C:\Windows\System32\CompPkgSrv.exe -Embedding
            1⤵
              PID:4448
            • C:\Windows\system32\taskmgr.exe
              "C:\Windows\system32\taskmgr.exe" /4
              1⤵
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4848

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

              Filesize

              152B

              MD5

              1eb86108cb8f5a956fdf48efbd5d06fe

              SHA1

              7b2b299f753798e4891df2d9cbf30f94b39ef924

              SHA256

              1b53367e0041d54af89e7dd59733231f5da1393c551ed2b943c89166c0baca40

              SHA512

              e2a661437688a4a01a6eb3b2bd7979ecf96b806f5a487d39354a7f0d44cb693a3b1c2cf6b1247b04e4106cc816105e982569572042bdddb3cd5bec23b4fce29d

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

              Filesize

              5KB

              MD5

              65bd1a90041e86cf61e406544a0d221a

              SHA1

              17d7e66dbb9bf044aaacd6539f24748b56b811dc

              SHA256

              54f78b3a70eff020d113a07f6dda66bd9864118533b487a48f13978cfc0aaa01

              SHA512

              0b4ca82d6de1a2885e934c773f61bfcadb35ea1cb9dd7fcfd2e0de4633c6379eb51b3c1d3aa1376da25104f323f66b08670ea7706203c5f4abb9c6015d30e753

            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

              Filesize

              8KB

              MD5

              73885385dd52ebe11f83e0263e2a8e8b

              SHA1

              00fd6af80cb57cce7be7763e4a32a07033ced0f2

              SHA256

              d1f3803793264732ecf3e1d57d6f3bdbe81a5f286c5fe9bc1236e7f8b89d3a58

              SHA512

              fc8ca71bfc9fd1f2922ae9c440ab4b0189bd1381e21ccc22b5954dd71283c3d5ee0d4a7a1daf4a5cb2fac548a59ec8af5ada52e1e4ddffa721fc95047b385375

            • memory/840-5-0x00007FF8561B0000-0x00007FF856C71000-memory.dmp

              Filesize

              10.8MB

            • memory/840-0-0x000001BE73A50000-0x000001BE73A68000-memory.dmp

              Filesize

              96KB

            • memory/840-6-0x000001BE75810000-0x000001BE75820000-memory.dmp

              Filesize

              64KB

            • memory/840-4-0x000001BE76990000-0x000001BE76EB8000-memory.dmp

              Filesize

              5.2MB

            • memory/840-3-0x000001BE75810000-0x000001BE75820000-memory.dmp

              Filesize

              64KB

            • memory/840-2-0x00007FF8561B0000-0x00007FF856C71000-memory.dmp

              Filesize

              10.8MB

            • memory/840-1-0x000001BE76290000-0x000001BE76452000-memory.dmp

              Filesize

              1.8MB

            • memory/4848-57-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-58-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-56-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-64-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-63-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-62-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-65-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-67-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-66-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB

            • memory/4848-68-0x0000028EFD9D0000-0x0000028EFD9D1000-memory.dmp

              Filesize

              4KB