Analysis

  • max time kernel
    479s
  • max time network
    488s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-04-2024 15:11

General

  • Target

    last.exe

  • Size

    78KB

  • MD5

    a5d7a3b8e953071c615799e37cbd62e9

  • SHA1

    2fb022555144fea178d6051f9041373ff3745400

  • SHA256

    5ea2cf6819e5d169debf1d48005946434845ff5f6fc468a021b2d899cc512a66

  • SHA512

    026dee1a9688af4374e9f733acc103a8da22996ccf7cd19005f5a7f7583314ee9a12a84a39e7609e7f0f838f6c832bfcf105cfe549252778dea14f1d10cfc749

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WPIC:5Zv5PDwbjNrmAE+SIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzMzc4NDUwMzMzNjU3MDkxMA.GZEnLG.XT8buvOfqj5hMJOjjIUCzO7UwojsExeE57BCUM

  • server_id

    1233784461334679643

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\last.exe
    "C:\Users\Admin\AppData\Local\Temp\last.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:976
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/976-0-0x00000217B0460000-0x00000217B0478000-memory.dmp

    Filesize

    96KB

  • memory/976-1-0x00000217CA9C0000-0x00000217CAB82000-memory.dmp

    Filesize

    1.8MB

  • memory/976-3-0x00000217CA890000-0x00000217CA8A0000-memory.dmp

    Filesize

    64KB

  • memory/976-2-0x00007FFEC9920000-0x00007FFECA3E1000-memory.dmp

    Filesize

    10.8MB

  • memory/976-4-0x00007FFEC9920000-0x00007FFECA3E1000-memory.dmp

    Filesize

    10.8MB

  • memory/3188-5-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-7-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-6-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-17-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-16-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-15-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-14-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-13-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-12-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB

  • memory/3188-11-0x0000023371DE0000-0x0000023371DE1000-memory.dmp

    Filesize

    4KB