Malware Analysis Report

2024-09-11 09:19

Sample ID 240619-xpvk4a1hrq
Target hehe's external.exe
SHA256 d71e071decfbf58e254b4c45a18c71b30446ca83d7acff324761569e57027b24
Tags
discordrat persistence rat rootkit stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d71e071decfbf58e254b4c45a18c71b30446ca83d7acff324761569e57027b24

Threat Level: Known bad

The file hehe's external.exe was found to be: Known bad.

Malicious Activity Summary

discordrat persistence rat rootkit stealer

Discordrat family

Suspicious use of NtCreateUserProcessOtherParentProcess

Discord RAT

Downloads MZ/PE file

Legitimate hosting services abused for malware hosting/C2

Suspicious use of SetThreadContext

Drops file in Windows directory

Unsigned PE

Suspicious use of SendNotifyMessage

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: GetForegroundWindowSpam

Checks SCSI registry key(s)

Suspicious behavior: EnumeratesProcesses

Uses Task Scheduler COM API

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-19 19:02

Signatures

Discordrat family

discordrat

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 19:02

Reported

2024-06-19 19:04

Platform

win10-20240404-en

Max time kernel

150s

Max time network

137s

Command Line

winlogon.exe

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Suspicious use of NtCreateUserProcessOtherParentProcess

Description Indicator Process Target
PID 4728 created 584 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\system32\winlogon.exe

Downloads MZ/PE file

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4728 set thread context of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\rescache\_merged\1601268389\715946058.pri C:\Windows\system32\taskmgr.exe N/A
File created C:\Windows\rescache\_merged\4183903823\2290032291.pri C:\Windows\system32\taskmgr.exe N/A

Checks SCSI registry key(s)

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\Explorer.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: 33 N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\dllhost.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\Explorer.EXE N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\Explorer.EXE N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4728 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\SYSTEM32\SCHTASKS.exe
PID 4728 wrote to memory of 4348 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\SYSTEM32\SCHTASKS.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4728 wrote to memory of 4100 N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe C:\Windows\System32\dllhost.exe
PID 4100 wrote to memory of 584 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\winlogon.exe
PID 4100 wrote to memory of 636 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\lsass.exe
PID 4100 wrote to memory of 728 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 908 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1004 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\dwm.exe
PID 4100 wrote to memory of 64 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 304 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 380 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1040 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1080 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1100 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1172 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1220 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1304 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1324 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1336 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1416 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1472 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1540 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1564 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1584 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1664 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1680 N/A C:\Windows\System32\dllhost.exe C:\Windows\System32\svchost.exe
PID 4100 wrote to memory of 1796 N/A C:\Windows\System32\dllhost.exe C:\Windows\System32\svchost.exe
PID 4100 wrote to memory of 1804 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\svchost.exe
PID 4100 wrote to memory of 1868 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1904 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 1536 N/A C:\Windows\System32\dllhost.exe C:\Windows\System32\spoolsv.exe
PID 4100 wrote to memory of 1900 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2060 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2364 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2492 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2536 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2544 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2588 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\sihost.exe
PID 4100 wrote to memory of 2632 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2708 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2716 N/A C:\Windows\System32\dllhost.exe C:\Windows\sysmon.exe
PID 4100 wrote to memory of 2756 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2780 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2792 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2904 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\taskhostw.exe
PID 4100 wrote to memory of 3052 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 2864 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\wbem\unsecapp.exe
PID 4100 wrote to memory of 3360 N/A C:\Windows\System32\dllhost.exe C:\Windows\Explorer.EXE
PID 4100 wrote to memory of 3932 N/A C:\Windows\System32\dllhost.exe C:\Windows\System32\RuntimeBroker.exe
PID 4100 wrote to memory of 3684 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe
PID 4100 wrote to memory of 4752 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 4488 N/A C:\Windows\System32\dllhost.exe c:\windows\system32\svchost.exe
PID 4100 wrote to memory of 3968 N/A C:\Windows\System32\dllhost.exe C:\Windows\system32\svchost.exe
PID 4100 wrote to memory of 2560 N/A C:\Windows\System32\dllhost.exe C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\system32\winlogon.exe

winlogon.exe

C:\Windows\system32\lsass.exe

C:\Windows\system32\lsass.exe

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k dcomlaunch -s PlugPlay

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k dcomlaunch -s LSM

C:\Windows\system32\dwm.exe

"dwm.exe"

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s gpsvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s lmhosts

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s EventLog

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s Schedule

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s NcbService

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservice -s nsi

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s Dhcp

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s Themes

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservice -s EventSystem

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s UserManager

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s SENS

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k networkservice -s NlaSvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s AudioEndpointBuilder

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k networkservice -s Dnscache

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservice -s netprofm

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\System32\svchost.exe

C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k appmodel -s StateRepository

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection

C:\Windows\System32\spoolsv.exe

C:\Windows\System32\spoolsv.exe

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k networkservice -s LanmanWorkstation

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k appmodel -s tiledatamodelsvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k networkservicenetworkrestricted -s PolicyAgent

c:\windows\system32\sihost.exe

sihost.exe

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s Browser

C:\Windows\sysmon.exe

C:\Windows\sysmon.exe

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k networkservice -s CryptSvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s TrkWks

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s WpnService

c:\windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s TokenBroker

C:\Windows\system32\wbem\unsecapp.exe

C:\Windows\system32\wbem\unsecapp.exe -Embedding

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localservice -s CDPSvc

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc

C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe

"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service

c:\windows\system32\svchost.exe

c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\system32\ApplicationFrameHost.exe

C:\Windows\system32\ApplicationFrameHost.exe -Embedding

C:\Windows\System32\InstallAgent.exe

C:\Windows\System32\InstallAgent.exe -Embedding

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}

C:\Windows\system32\wbem\wmiprvse.exe

C:\Windows\system32\wbem\wmiprvse.exe

C:\Users\Admin\AppData\Local\Temp\hehe's external.exe

"C:\Users\Admin\AppData\Local\Temp\hehe's external.exe"

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x3f8

C:\Windows\SYSTEM32\SCHTASKS.exe

"SCHTASKS.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I

C:\Windows\System32\dllhost.exe

C:\Windows\System32\dllhost.exe /Processid:{502ccfae-c3a2-47f2-ac71-6f0b0a4d45c7}

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.133.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 discord.com udp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 234.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 geolocation-db.com udp
DE 159.89.102.253:443 geolocation-db.com tcp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 253.102.89.159.in-addr.arpa udp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
US 8.8.8.8:53 63.141.182.52.in-addr.arpa udp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 133.108.199.185.in-addr.arpa udp

Files

memory/4728-0-0x00007FFFABA43000-0x00007FFFABA44000-memory.dmp

memory/4728-1-0x0000011ECE280000-0x0000011ECE298000-memory.dmp

memory/4728-2-0x0000011EE8880000-0x0000011EE8A42000-memory.dmp

memory/4728-3-0x00007FFFABA40000-0x00007FFFAC42C000-memory.dmp

memory/4728-4-0x0000011EE9080000-0x0000011EE95A6000-memory.dmp

memory/4728-12-0x00007FFFABA43000-0x00007FFFABA44000-memory.dmp

memory/4728-13-0x00007FFFABA40000-0x00007FFFAC42C000-memory.dmp

memory/4728-17-0x0000011EEB0F0000-0x0000011EEB19A000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Speech\Files\UserLexicons\SP_FB37E93139FE414EACF34E30FDA993A6.dat

MD5 d55714f7fc0bdc6379d97500d325b221
SHA1 0662517e18ca899b56fff8cf2d9d917afd54a6ce
SHA256 9da511206473d7f3c178592dca1a7d9a9da5ab3573602f39c8a51649166c49a8
SHA512 561d7e6dfb9517ee1e2dfeb5e2b6b47a378d06331f5e0f30d6280a628c68ee01820bfdb7920828b7c0531f4f407cd1865bd3d3e464a09e454c71980c7d805ea3

memory/4728-25-0x0000011EEB1E0000-0x0000011EEB21E000-memory.dmp

memory/4728-26-0x00007FFFC8460000-0x00007FFFC863B000-memory.dmp

memory/4728-27-0x00007FFFC6D40000-0x00007FFFC6DEE000-memory.dmp

memory/4100-28-0x0000000140000000-0x0000000140040000-memory.dmp

memory/4100-29-0x0000000140000000-0x0000000140040000-memory.dmp

memory/4100-30-0x00007FFFC8460000-0x00007FFFC863B000-memory.dmp

memory/4100-31-0x00007FFFC6D40000-0x00007FFFC6DEE000-memory.dmp

memory/4100-32-0x0000000140000000-0x0000000140040000-memory.dmp

memory/584-37-0x00007FFF884F0000-0x00007FFF88500000-memory.dmp

memory/636-40-0x00007FFF884F0000-0x00007FFF88500000-memory.dmp

memory/636-39-0x000001F3C7E60000-0x000001F3C7E8A000-memory.dmp

memory/1004-45-0x0000028C31FC0000-0x0000028C31FEA000-memory.dmp

memory/3360-89-0x00007FFF884F0000-0x00007FFF88500000-memory.dmp

memory/3360-88-0x0000000002590000-0x00000000025BA000-memory.dmp

memory/1004-46-0x00007FFF884F0000-0x00007FFF88500000-memory.dmp

memory/584-36-0x0000022D64AB0000-0x0000022D64ADA000-memory.dmp

memory/584-34-0x0000022D64A80000-0x0000022D64AA3000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 19:02

Reported

2024-06-19 19:04

Platform

win10v2004-20240508-en

Max time kernel

147s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\hehe's external.exe"

Signatures

Discord RAT

stealer rootkit rat persistence discordrat

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\hehe's external.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\hehe's external.exe

"C:\Users\Admin\AppData\Local\Temp\hehe's external.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 gateway.discord.gg udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

memory/652-0-0x0000024169CB0000-0x0000024169CC8000-memory.dmp

memory/652-1-0x00007FFECB833000-0x00007FFECB835000-memory.dmp

memory/652-2-0x000002416C3E0000-0x000002416C5A2000-memory.dmp

memory/652-3-0x00007FFECB830000-0x00007FFECC2F1000-memory.dmp

memory/652-4-0x00007FFECB830000-0x00007FFECC2F1000-memory.dmp