Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-06-2024 14:42
Behavioral task
behavioral1
Sample
celex cracked.exe
Resource
win11-20240508-en
windows11-21h2-x64
5 signatures
150 seconds
General
-
Target
celex cracked.exe
-
Size
78KB
-
MD5
838552dd5effcd196247bf7476c11787
-
SHA1
05ed3b610c5a6537aec6652366175eef41ebd281
-
SHA256
048568f21de0495068ca83db248cc235578abd489e416c97001a8af6cd54af98
-
SHA512
1c91f1292b2722330141b4671cd6587368d2d86bfc3c38e906d459822bd7d4a2fb49c25d9c13ecfbf45368f3acfd49bec5a6b305c23e1f3ee09a4ef87e83522b
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI0OTM2MzAwMDAzNzYwNTQ2OA.G2Z8iB.JlHA8lZ2dU5w37dmNBpG7AYm7TcaKA0xvUPkeM
-
server_id
1249359208781058119
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
flow ioc 19 discord.com 1 discord.com 3 discord.com 6 discord.com 15 discord.com 16 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1972 celex cracked.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1516 1972 celex cracked.exe 85 PID 1972 wrote to memory of 1516 1972 celex cracked.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\celex cracked.exe"C:\Users\Admin\AppData\Local\Temp\celex cracked.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /t 02⤵PID:1516
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:2872
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a0c855 /state1:0x41c64e6d1⤵PID:2856