Analysis
-
max time kernel
479s -
max time network
488s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
27-04-2024 15:11
Behavioral task
behavioral1
Sample
last.exe
Resource
win10v2004-20240419-en
windows10-2004-x64
6 signatures
600 seconds
General
-
Target
last.exe
-
Size
78KB
-
MD5
a5d7a3b8e953071c615799e37cbd62e9
-
SHA1
2fb022555144fea178d6051f9041373ff3745400
-
SHA256
5ea2cf6819e5d169debf1d48005946434845ff5f6fc468a021b2d899cc512a66
-
SHA512
026dee1a9688af4374e9f733acc103a8da22996ccf7cd19005f5a7f7583314ee9a12a84a39e7609e7f0f838f6c832bfcf105cfe549252778dea14f1d10cfc749
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WPIC:5Zv5PDwbjNrmAE+SIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIzMzc4NDUwMzMzNjU3MDkxMA.GZEnLG.XT8buvOfqj5hMJOjjIUCzO7UwojsExeE57BCUM
-
server_id
1233784461334679643
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 976 last.exe Token: SeDebugPrivilege 3188 taskmgr.exe Token: SeSystemProfilePrivilege 3188 taskmgr.exe Token: SeCreateGlobalPrivilege 3188 taskmgr.exe Token: 33 3188 taskmgr.exe Token: SeIncBasePriorityPrivilege 3188 taskmgr.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe -
Suspicious use of SendNotifyMessage 35 IoCs
pid Process 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe 3188 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\last.exe"C:\Users\Admin\AppData\Local\Temp\last.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:976
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3188