Resubmissions
Analysis
-
max time kernel
129s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2024 19:16
Behavioral task
behavioral1
Sample
Client builder.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Client builder.exe
Resource
win10v2004-20240412-en
Errors
General
-
Target
Client builder.exe
-
Size
78KB
-
MD5
9547c3740dd2064871500a170e24894e
-
SHA1
713f43fcb2246b0b5851e2cb68bc6c1e5b026a3e
-
SHA256
97b054927f7c703590600c3c92f587b9ce2f9aea66c37f4af39e1dcd415c1969
-
SHA512
cb1f79397b3984507eaaf8676c806116ca4eb1a8dc107efb172716de5b9fca47303fcde3290f68f190c2a9bd7c046b16b25f0b5bd83326fe7f6eebc32c3c9e74
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+JPIC:5Zv5PDwbjNrmAE+5IC
Malware Config
Extracted
discordrat
-
discord_token
MTIyODAxMDYwNDQzNDk1MjIyMw.GEisFj.5v3bSKq7shKRVwTx4MSA5Fkn-Cyp3LgvJvnRIw
-
server_id
1228010915325280286
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3198953144-1466794930-246379610-1000\Control Panel\International\Geo\Nation Client builder.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 16 discord.com 61 discord.com 54 raw.githubusercontent.com 52 discord.com 55 raw.githubusercontent.com 57 discord.com 59 discord.com 33 discord.com 37 discord.com 53 discord.com 56 discord.com 60 discord.com 72 discord.com 17 discord.com 38 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "124" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1788 Client builder.exe Token: SeShutdownPrivilege 1576 shutdown.exe Token: SeRemoteShutdownPrivilege 1576 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1908 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1576 1788 Client builder.exe 92 PID 1788 wrote to memory of 1576 1788 Client builder.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client builder.exe"C:\Users\Admin\AppData\Local\Temp\Client builder.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa399c855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:1908