Analysis Overview
SHA256
14bd51be45a8ff796ee65e4392fd83b620db7eb22c1795c8a3cc2d6f78d7a5a8
Threat Level: Known bad
The file Coreblocks_installer.exe was found to be: Known bad.
Malicious Activity Summary
Discord RAT
Discordrat family
Unsigned PE
Suspicious use of WriteProcessMemory
Suspicious use of AdjustPrivilegeToken
MITRE ATT&CK Matrix
Analysis: static1
Detonation Overview
Reported
2024-06-16 18:14
Signatures
Discordrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2024-06-16 18:14
Reported
2024-06-17 00:26
Platform
win10v2004-20240508-en
Max time kernel
1795s
Max time network
1799s
Command Line
Signatures
Discord RAT
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe
"C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4036,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=4204 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3996,i,10373433614523925616,13586256558317053467,262144 --variations-seed-version --mojo-platform-channel-handle=3988 /prefetch:8
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | gateway.discord.gg | udp |
Files
memory/708-0-0x000002684EB80000-0x000002684EB98000-memory.dmp
memory/708-1-0x00007FF939B93000-0x00007FF939B95000-memory.dmp
memory/708-2-0x0000026869290000-0x0000026869452000-memory.dmp
memory/708-3-0x00007FF939B90000-0x00007FF93A651000-memory.dmp
memory/708-4-0x00007FF939B90000-0x00007FF93A651000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-16 18:14
Reported
2024-06-17 00:26
Platform
win7-20240508-en
Max time kernel
1565s
Max time network
1566s
Command Line
Signatures
Discord RAT
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1700 wrote to memory of 2416 | N/A | C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe | C:\Windows\system32\WerFault.exe |
| PID 1700 wrote to memory of 2416 | N/A | C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe | C:\Windows\system32\WerFault.exe |
| PID 1700 wrote to memory of 2416 | N/A | C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe | C:\Windows\system32\WerFault.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe
"C:\Users\Admin\AppData\Local\Temp\Coreblocks_installer.exe"
C:\Windows\system32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1700 -s 600
Network
Files
memory/1700-0-0x000007FEF58F3000-0x000007FEF58F4000-memory.dmp
memory/1700-1-0x000000013F220000-0x000000013F238000-memory.dmp
memory/1700-2-0x000007FEF58F0000-0x000007FEF62DC000-memory.dmp