Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 16:04
Static task
static1
Behavioral task
behavioral1
Sample
leokadia film/leosia s4pm.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
leokadia film/leosia s4pm.exe
Resource
win10v2004-20240426-en
General
-
Target
leokadia film/leosia s4pm.exe
-
Size
1.1MB
-
MD5
3d988d51bb78c7f05d1d9d621704bd8b
-
SHA1
63d9eb61ef9c3a8c06e551651b8ad191f5cbe5a6
-
SHA256
f9c95d44186d306f43e7c7b0be319d9feaba04226ce016b56949916c5185c007
-
SHA512
c6ccf1423ab8bb6821521810b1247b288bb27dd00047a9deb5dc81be215a9a70f41bc44efce93638056e3a20b9f6efa2b552dae0b2483b613d5302bbcad25a62
-
SSDEEP
24576:9uDXTIGaPhEYzUzA0x4w0LzbUNfGL4w0LzbUNHFMkcY4VV+XqyPJcOtk3MrS6y:gDjlabwz9Wvb8vbgFxcYZXfX+kS6y
Malware Config
Extracted
discordrat
-
discord_token
MTI0MzY3MDczMTU5MDcyOTc5OQ.G25Fr1.zUYZMU8iXioqif_5Uws8Eat0XjMaXMVbm9OT_0
-
server_id
1243671022599802944
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\Control Panel\International\Geo\Nation leosia s4pm.exe -
Executes dropped EXE 1 IoCs
pid Process 3284 Client-built.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 43 discord.com 13 discord.com 16 discord.com 21 discord.com 42 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings leosia s4pm.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3060 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3060 vlc.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3284 Client-built.exe Token: 33 2740 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2740 AUDIODG.EXE Token: 33 3060 vlc.exe Token: SeIncBasePriorityPrivilege 3060 vlc.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe 3060 vlc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1248 wrote to memory of 3284 1248 leosia s4pm.exe 82 PID 1248 wrote to memory of 3284 1248 leosia s4pm.exe 82 PID 1248 wrote to memory of 3060 1248 leosia s4pm.exe 84 PID 1248 wrote to memory of 3060 1248 leosia s4pm.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\leokadia film\leosia s4pm.exe"C:\Users\Admin\AppData\Local\Temp\leokadia film\leosia s4pm.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\leokadia film\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\leokadia film\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3284
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\leokadia film\leokadia.mp4"2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x2fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD52a562de28a4a276c5fd1496b298bf78c
SHA1fa9be444f9dd748c9e244f9590e210322d619127
SHA256cf49718a7221223c4ac270b07f1775f82424a2edda1788fa47a743249c9ebe1b
SHA51228aede7a8c9572a5f1d68ff32b7fe4a47c8382f958f71df6cf5425e5e4ecc015c321b697334790b5f0615455761ace07854213dff0d1c3536c3ebeea5a851d59
-
Filesize
470KB
MD51e98d436a0b9f09aa3944e545ec8764d
SHA1f9c1aa370097c6849349d2453419e19be2e48eac
SHA25604d524c0b369b29199bb956576c18be7933ad25db9a836e205d48850fb664fdb
SHA512387fa769d3f8c78efc36a76eb464dd548e4c7acd0e46eeacc2c324f343773e976d7aca18cb0b16379f5cb2a06def9f09fbe80d038a001d688b2d4321999b95d2