Resubmissions

02-06-2024 18:16

240602-wwfvvabd56 10

02-06-2024 17:44

240602-wa9k2aag22 10

Analysis

  • max time kernel
    1049s
  • max time network
    1056s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-06-2024 18:16

General

  • Target

    https://cdn.discordapp.com/attachments/1246629392017264730/1246630633296498749/SolaraB.zip?ex=665d16c0&is=665bc540&hm=e92ff639e30663ccb29b047bd40cc92f9c4abcaf01ca27c3a1803b4b7204e774&

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0NTMyMTUyODE4NzQyNDc3OA.GR78y4.vMfEj5skpraljw4MJ9J0BO20fQH19kOJIYpkg4

  • server_id

    1245464272843051061

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1246629392017264730/1246630633296498749/SolaraB.zip?ex=665d16c0&is=665bc540&hm=e92ff639e30663ccb29b047bd40cc92f9c4abcaf01ca27c3a1803b4b7204e774&
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe140eab58,0x7ffe140eab68,0x7ffe140eab78
      2⤵
        PID:3152
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1516 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:2
        2⤵
          PID:1904
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:8
          2⤵
            PID:540
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2128 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:8
            2⤵
              PID:952
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:1
              2⤵
                PID:3764
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:1
                2⤵
                  PID:4540
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4508 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:8
                  2⤵
                  • NTFS ADS
                  PID:700
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4564 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:8
                  2⤵
                    PID:4252
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4808 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:8
                    2⤵
                      PID:224
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1804,i,14235547499441518075,899409899756422821,131072 /prefetch:2
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2592
                  • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                    1⤵
                      PID:1312
                    • C:\Windows\System32\rundll32.exe
                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                      1⤵
                        PID:3724
                      • C:\Program Files\7-Zip\7zFM.exe
                        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\SolarbB.exe"
                        1⤵
                        • Suspicious behavior: GetForegroundWindowSpam
                        • Suspicious use of FindShellTrayWindow
                        PID:2096
                      • C:\Users\Admin\Desktop\SolarbB.exe
                        "C:\Users\Admin\Desktop\SolarbB.exe"
                        1⤵
                          PID:1360

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                          Filesize

                          1KB

                          MD5

                          577a35996d4b8497d8db721f96107107

                          SHA1

                          39a9b25d39e00c9475d4474d2018a1474a0b7889

                          SHA256

                          4988187cbc0bdfec97ba93c147b0240fd36fec4af76f8440d53641558124519a

                          SHA512

                          fbd397eb5ba1a05ffb9261804101d4c4f31c3c52b63bea15408b37700a9f853a05408e4b48421cd29e2edc8fd6431336d79646de6d748d8425a4e58de1c3179b

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                          Filesize

                          2B

                          MD5

                          d751713988987e9331980363e24189ce

                          SHA1

                          97d170e1550eee4afc0af065b78cda302a97674c

                          SHA256

                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                          SHA512

                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                          Filesize

                          7KB

                          MD5

                          cf3e699e2a1229eff7dd9119f22b7b4a

                          SHA1

                          824753d24a390f976647e9f6b306c62714324b43

                          SHA256

                          d50b17784863fa6d941ba206cddd7f89018571615f3a0cf908ce268c50a8378a

                          SHA512

                          56d014f02a6fb1fdc9522552f904f435524fdec271595f2fe307dec8a125e1980d41a05a34493df14c5a340d7ad1b7dc77bc6bc090647226d8e26b5e70703b67

                        • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                          Filesize

                          130KB

                          MD5

                          9768c888a37c2b57f4c23e32e69a81f5

                          SHA1

                          1b3a73b342c2bc21ddff9879fd9cb92ecb869f07

                          SHA256

                          8bbee9711602dc186e3b560a557430feaa17e9cb9308bc13d5dcb606fbb76d91

                          SHA512

                          72cb893c8464b870fdde6db496559180acd4a2c86fd15bad2dfddb9a9b65f8a3262dc5113c21fbe46e17e9de1deccee28e794adda77358b11d3516393e77949d

                        • C:\Users\Admin\Downloads\SolaraB.zip

                          Filesize

                          27KB

                          MD5

                          c0426e2992fd4fa90336665e6d56abe8

                          SHA1

                          8b00e93e5d84520c07d2e5942af997afe0dc1e63

                          SHA256

                          f20ff052ab37ce445122c007f90d20148f4e0de842417b4e26230f128ce485f0

                          SHA512

                          e78d71040b24143e51f311e4f3bb284f4b76ff5ddbde5a97b65b0ae1547d5e0979f77508abe40ce3cd11862d597d66d355cc3c3a3d4c01f0c520cd58d9593ebf

                        • C:\Users\Admin\Downloads\SolaraB.zip:Zone.Identifier

                          Filesize

                          219B

                          MD5

                          ce51ea6561f88f1ac0fd9a04118ac17a

                          SHA1

                          0519e1f676029817d76d261727e8dbd3240bda63

                          SHA256

                          54242d045af8c13f311d2fe3d16286b2d890d22fae5f6ec2f87c3a01de03ca1f

                          SHA512

                          10dd3ef2841194bbde6972dbcaa738139c7c4f396880d82315216d4f91eec5ad5e2427785bf29c4013b90dd802dcee3980adfc2e73570786e4535241aa1ec5e5

                        • memory/1360-81-0x000001A3554B0000-0x000001A3554C8000-memory.dmp

                          Filesize

                          96KB

                        • memory/1360-82-0x000001A36FC40000-0x000001A36FE02000-memory.dmp

                          Filesize

                          1.8MB

                        • memory/1360-83-0x000001A370520000-0x000001A370A48000-memory.dmp

                          Filesize

                          5.2MB

                        • memory/1360-84-0x000001A36FBC0000-0x000001A36FC36000-memory.dmp

                          Filesize

                          472KB

                        • memory/1360-85-0x000001A3571D0000-0x000001A3571E2000-memory.dmp

                          Filesize

                          72KB

                        • memory/1360-86-0x000001A357210000-0x000001A35722E000-memory.dmp

                          Filesize

                          120KB

                        • memory/1360-87-0x000001A370100000-0x000001A3702B3000-memory.dmp

                          Filesize

                          1.7MB

                        • memory/1360-88-0x000001A370100000-0x000001A3702B3000-memory.dmp

                          Filesize

                          1.7MB