Analysis
-
max time kernel
96s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-06-2024 17:44
Behavioral task
behavioral1
Sample
Release/Discord rat.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
builder.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
dnlib.dll
Resource
win10v2004-20240508-en
General
-
Target
builder.exe
-
Size
10KB
-
MD5
4f04f0e1ff050abf6f1696be1e8bb039
-
SHA1
bebf3088fff4595bfb53aea6af11741946bbd9ce
-
SHA256
ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
-
SHA512
94713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12
-
SSDEEP
96:IJXYAuB2glBLgyOk3LxdjP2rm549JSTuwUYXzP+B1izXTa/HFpff3LG+tzNt:IJXDk7LI4uwtDPC1ijCHffSs
Malware Config
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 2 IoCs
Processes:
Client-built.exeClient-built.exepid process 3892 Client-built.exe 1324 Client-built.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Client-built.exeClient-built.exedescription pid process Token: SeDebugPrivilege 3892 Client-built.exe Token: SeDebugPrivilege 1324 Client-built.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
builder.exepid process 4724 builder.exe 4724 builder.exe 4724 builder.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\builder.exe"C:\Users\Admin\AppData\Local\Temp\builder.exe"1⤵
- Suspicious use of FindShellTrayWindow
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\Desktop\Client-built.exe"C:\Users\Admin\Desktop\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Desktop\Client-built.exe"C:\Users\Admin\Desktop\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\Client-built.exeFilesize
78KB
MD55fa78b19ae158350ead3ef50feb6a7a2
SHA157d57ca525968fd9d5a9ee38e783e288896caa01
SHA2561d4914ee768fbaf1b82a860ace972a01338c12a05ff7dbdde42bfab43b21a4d5
SHA512c0d0803b5ceaa4c3013132ead8d8a95faae4a01933c41cb4c998572c2a31c971faab5bb2c488aee8d73a16a0037a78e09130e1ecd2804c40f0665399c404c00e
-
memory/3892-20-0x00007FFA921C0000-0x00007FFA92C81000-memory.dmpFilesize
10.8MB
-
memory/3892-16-0x00007FFA921C0000-0x00007FFA92C81000-memory.dmpFilesize
10.8MB
-
memory/3892-15-0x0000011A31920000-0x0000011A31AE2000-memory.dmpFilesize
1.8MB
-
memory/3892-14-0x0000011A172F0000-0x0000011A17308000-memory.dmpFilesize
96KB
-
memory/3892-13-0x00007FFA921C3000-0x00007FFA921C5000-memory.dmpFilesize
8KB
-
memory/4724-4-0x0000000005610000-0x000000000561A000-memory.dmpFilesize
40KB
-
memory/4724-9-0x00000000752AE000-0x00000000752AF000-memory.dmpFilesize
4KB
-
memory/4724-10-0x00000000752A0000-0x0000000075A50000-memory.dmpFilesize
7.7MB
-
memory/4724-6-0x00000000069F0000-0x0000000006B12000-memory.dmpFilesize
1.1MB
-
memory/4724-5-0x00000000752A0000-0x0000000075A50000-memory.dmpFilesize
7.7MB
-
memory/4724-0-0x00000000752AE000-0x00000000752AF000-memory.dmpFilesize
4KB
-
memory/4724-3-0x0000000005660000-0x00000000056F2000-memory.dmpFilesize
584KB
-
memory/4724-2-0x0000000005C10000-0x00000000061B4000-memory.dmpFilesize
5.6MB
-
memory/4724-18-0x00000000752A0000-0x0000000075A50000-memory.dmpFilesize
7.7MB
-
memory/4724-1-0x0000000000C10000-0x0000000000C18000-memory.dmpFilesize
32KB