Analysis
-
max time kernel
24s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 22:47
Behavioral task
behavioral1
Sample
swift.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
swift.exe
-
Size
78KB
-
MD5
189ba06a2baa7c6ddfb47acace6b7d9c
-
SHA1
39a6fe1f3ebe839b9dd9302ecd76e9d73e5b0bfe
-
SHA256
00ca94eac89ece8c6420c30036489b8fb639c2686ad41ab0a0b1cf5908f276a7
-
SHA512
09d08dc389d234ba028990646dd9471eaca33cd2af63ebfc149dfa9ae90a3bed847c91be3f0842cfae7737d44d231d1017daf5e019623bfb89521d2ba9e93a42
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+XPIC:5Zv5PDwbjNrmAE+fIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI0OTc2OTg0MzQ5OTA3MzU3OA.GBM6AV.Ued_4o5cJR-Ao-rT2MBJ4MRvp8jVqZHYIowkbk
-
server_id
1249770084449255424
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 8 discord.com 9 discord.com 19 discord.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2384 swift.exe Token: SeDebugPrivilege 728 taskmgr.exe Token: SeSystemProfilePrivilege 728 taskmgr.exe Token: SeCreateGlobalPrivilege 728 taskmgr.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
pid Process 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe 728 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\swift.exe"C:\Users\Admin\AppData\Local\Temp\swift.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:728