Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 00:19
Behavioral task
behavioral1
Sample
yjnclient-v3.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
yjnclient-v3.exe
Resource
win10v2004-20240611-en
General
-
Target
yjnclient-v3.exe
-
Size
78KB
-
MD5
f758d08d23a5ddf8905d5c17084abf07
-
SHA1
b237a04b0ab5374f41ec90186d1de0250569a82d
-
SHA256
6624c79c2c07fbcb8d4244fadd4e16ad4c536c187c25acaf3b831fff7cbda3c9
-
SHA512
7fd582bb2c319d1cd43efa1d01420f2e58378c15542c044b2450da0da0112a55ae98afd52e851da767d487456927556152d3925ef11194c35bb25bcc9b7f747f
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+BAPIC:5Zv5PDwbjNrmAE+OIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1NDkyMzczMDE3ODY3NDgwMw.GNKnH3._2hi153EQeLcF4SWSwr0pQuzH__TVonJih1mFM
-
server_id
1254923576340119644
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1980 mmc.exe 1516 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 468 yjnclient-v3.exe Token: SeDebugPrivilege 1516 taskmgr.exe Token: SeSystemProfilePrivilege 1516 taskmgr.exe Token: SeCreateGlobalPrivilege 1516 taskmgr.exe Token: SeSecurityPrivilege 1516 taskmgr.exe Token: SeTakeOwnershipPrivilege 1516 taskmgr.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe Token: 33 1980 mmc.exe Token: SeIncBasePriorityPrivilege 1980 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe 1516 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1980 mmc.exe 1980 mmc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\yjnclient-v3.exe"C:\Users\Admin\AppData\Local\Temp\yjnclient-v3.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:468
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1516
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2104
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1980