Analysis
-
max time kernel
440s -
max time network
1173s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 17:09
Behavioral task
behavioral1
Sample
DiscordClient_protected1.exe
Resource
win7-20240221-en
windows7-x64
7 signatures
1800 seconds
General
-
Target
DiscordClient_protected1.exe
-
Size
3.9MB
-
MD5
e424147d44da9c361371240460f70855
-
SHA1
d72d2366e00a44557992b0e6d9d95a0d5c92135e
-
SHA256
74d21d44cbe608ad924046d1a210ff1296fef147a90474e76df69b6f6a3a3ab3
-
SHA512
9b01cfb1df86d65a59c2d3009512b5dd4ae29bb3a9c4caf1ce4601d19deb05eacaa73bb883e23ddbdf298a4ed9389b837b07a43b797c3e36474bfb7ef8918074
-
SSDEEP
98304:8DXwmM5AAksLQ1jksaKZi5B4yAxbA+onKyiKKyE7LQhHz:awmM6A5LQ1jksjiQO8KKyE7LET
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DiscordClient_protected1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DiscordClient_protected1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DiscordClient_protected1.exe -
resource yara_rule behavioral2/memory/1492-0-0x00007FF6179A0000-0x00007FF618402000-memory.dmp themida behavioral2/memory/1492-8-0x00007FF6179A0000-0x00007FF618402000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DiscordClient_protected1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1492 DiscordClient_protected1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 4776 1492 DiscordClient_protected1.exe 88 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 1492 wrote to memory of 4776 1492 DiscordClient_protected1.exe 88 PID 4776 wrote to memory of 452 4776 explorer.exe 91 PID 4776 wrote to memory of 452 4776 explorer.exe 91 PID 452 wrote to memory of 2920 452 cmd.exe 92 PID 452 wrote to memory of 2920 452 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordClient_protected1.exe"C:\Users\Admin\AppData\Local\Temp\DiscordClient_protected1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Windows\explorer.exe" MD5 | find /i /v "md5" | find /i /v "certutil"3⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Windows\explorer.exe" MD54⤵PID:2920
-
-
-