Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
wow.zip
Resource
win10v2004-20240611-en
General
-
Target
wow.zip
-
Size
28KB
-
MD5
a98c71bc37633b0339b7df3e131020a3
-
SHA1
a2db16bdbb7a8e061778762757379b9f0046ed50
-
SHA256
0a6a0baaf4774255ad58385d3e99c2978ab2bf1429071212a52345c5171555da
-
SHA512
fbe4d01746848b5d1c7d3d38f6645153f580a6b19675eea55d1bc64d096a98df216bf0271823a1fafc7f14e65f81bb148c3bdeeb4f35c7a12f3deffd21105a49
-
SSDEEP
768:Rhj5hbiKvyvHg3ibJtZfJZZ8xgJdbvb9cL4sDL2kAm:R9LmK6/g3i9tPhJdTe1Z
Malware Config
Extracted
discordrat
-
discord_token
MTI1MDY4MDAwOTA1NjcxODg1OA.Gsgb1p.yKrTtjnMzEfZMtnNe8EGmYm3XDkNU2c5sOLJ5Y
-
server_id
1250638699088187392
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 18 IoCs
pid Process 4520 discord nitro generator.exe 2104 discord nitro generator.exe 1272 discord nitro generator.exe 4764 discord nitro generator.exe 3552 discord nitro generator.exe 1320 discord nitro generator.exe 3408 discord nitro generator.exe 2000 discord nitro generator.exe 2124 discord nitro generator.exe 468 discord nitro generator.exe 3784 discord nitro generator.exe 3892 discord nitro generator.exe 4708 discord nitro generator.exe 3064 discord nitro generator.exe 3824 discord nitro generator.exe 2256 discord nitro generator.exe 5124 discord nitro generator.exe 5496 discord nitro generator.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeRestorePrivilege 3108 7zG.exe Token: 35 3108 7zG.exe Token: SeSecurityPrivilege 3108 7zG.exe Token: SeSecurityPrivilege 3108 7zG.exe Token: SeDebugPrivilege 4520 discord nitro generator.exe Token: SeDebugPrivilege 2104 discord nitro generator.exe Token: SeDebugPrivilege 1272 discord nitro generator.exe Token: SeDebugPrivilege 4764 discord nitro generator.exe Token: SeDebugPrivilege 3552 discord nitro generator.exe Token: SeDebugPrivilege 1320 discord nitro generator.exe Token: SeDebugPrivilege 3408 discord nitro generator.exe Token: SeDebugPrivilege 2000 discord nitro generator.exe Token: SeDebugPrivilege 2124 discord nitro generator.exe Token: SeDebugPrivilege 468 discord nitro generator.exe Token: SeDebugPrivilege 3784 discord nitro generator.exe Token: SeDebugPrivilege 3892 discord nitro generator.exe Token: SeDebugPrivilege 4708 discord nitro generator.exe Token: SeDebugPrivilege 3064 discord nitro generator.exe Token: SeDebugPrivilege 3824 discord nitro generator.exe Token: SeDebugPrivilege 2256 discord nitro generator.exe Token: SeDebugPrivilege 5124 discord nitro generator.exe Token: SeDebugPrivilege 5496 discord nitro generator.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3108 7zG.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\wow.zip1⤵PID:992
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1572
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap10174:86:7zEvent114751⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3108
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:468
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"C:\Users\Admin\AppData\Local\Temp\wow\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
C:\Users\Admin\Desktop\discord nitro generator.exe"C:\Users\Admin\Desktop\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
C:\Users\Admin\Desktop\discord nitro generator.exe"C:\Users\Admin\Desktop\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3824
-
C:\Users\Admin\Desktop\discord nitro generator.exe"C:\Users\Admin\Desktop\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
C:\Users\Admin\Desktop\discord nitro generator.exe"C:\Users\Admin\Desktop\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5124
-
C:\Users\Admin\Desktop\discord nitro generator.exe"C:\Users\Admin\Desktop\discord nitro generator.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5496
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD558152cdf93eed1f705ed64ba2f36ed60
SHA1fac451bb4b4733c855479a0143306d0cf027da80
SHA2560272a484c96171641cccca7b0315bd5e112c8cb7bf54ce05ad801d31d1c9296f
SHA5124c3b670625b1ab15b16bf118ac32e13b7548a73f02eefdc0c6c415d09a2998ba2bd20b1ad59397abc788c8cb41633a0d37623c679a85f3996737a44b4f4aadb2