Analysis
-
max time kernel
73s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28-06-2024 18:30
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240611-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
9f8192bca777a039d99372a530cdb635
-
SHA1
a2556acb2ef8989c7d1b07d1744a0b5fd7f58a68
-
SHA256
9d75cc219fc049368f2dcd1a0e2b6d770c5c00e25e9fcaa43cbffb64beec2f4f
-
SHA512
9e32db23374ac09ef4833fd1b5e603c294842dc380daca3aa6f2cf27d5be9df081634c589b97f7850c7eadbf672bf3ad5a2f580b6dbb570a68f7280524de3f81
-
SSDEEP
1536:F2WjO8XeEXFd5P7v88wbjNrfxCXhRoKV6+V+4PIC:FZz5PDwbjNrmAE+cIC
Malware Config
Extracted
discordrat
-
discord_token
OTg4NTc4MzE5NDUwNjU2ODA4.GJB_CK.pGGNRyaGaQAGmQrFjvmnUeTW-IdHcYf2pAyEXQ
-
server_id
1163956714090016808
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4496 created 604 4496 Client-built.exe 5 -
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
flow ioc 60 raw.githubusercontent.com 61 discord.com 62 discord.com 10 discord.com 40 discord.com 41 discord.com 42 discord.com 55 raw.githubusercontent.com 11 discord.com 30 discord.com 56 raw.githubusercontent.com 57 discord.com -
Drops file in System32 directory 10 IoCs
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Wake To Work svchost.exe File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Maintenance Work svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4496 set thread context of 328 4496 Client-built.exe 96 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString mousocoreworker.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS mousocoreworker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU mousocoreworker.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 4496 Client-built.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe 328 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4496 Client-built.exe Token: SeDebugPrivilege 4496 Client-built.exe Token: SeDebugPrivilege 328 dllhost.exe Token: SeShutdownPrivilege 2300 mousocoreworker.exe Token: SeCreatePagefilePrivilege 2300 mousocoreworker.exe Token: SeShutdownPrivilege 2300 mousocoreworker.exe Token: SeCreatePagefilePrivilege 2300 mousocoreworker.exe Token: SeShutdownPrivilege 3892 RuntimeBroker.exe Token: SeShutdownPrivilege 4496 Client-built.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 4496 wrote to memory of 328 4496 Client-built.exe 96 PID 328 wrote to memory of 604 328 dllhost.exe 5 PID 328 wrote to memory of 664 328 dllhost.exe 7 PID 328 wrote to memory of 936 328 dllhost.exe 12 PID 328 wrote to memory of 1016 328 dllhost.exe 13 PID 328 wrote to memory of 504 328 dllhost.exe 14 PID 328 wrote to memory of 932 328 dllhost.exe 16 PID 328 wrote to memory of 1096 328 dllhost.exe 17 PID 328 wrote to memory of 1108 328 dllhost.exe 18 PID 328 wrote to memory of 1132 328 dllhost.exe 19 PID 328 wrote to memory of 1156 328 dllhost.exe 20 PID 328 wrote to memory of 1236 328 dllhost.exe 21 PID 328 wrote to memory of 1300 328 dllhost.exe 22 PID 328 wrote to memory of 1312 328 dllhost.exe 23 PID 328 wrote to memory of 1408 328 dllhost.exe 24 PID 328 wrote to memory of 1444 328 dllhost.exe 25 PID 328 wrote to memory of 1572 328 dllhost.exe 26 PID 328 wrote to memory of 1584 328 dllhost.exe 27 PID 328 wrote to memory of 1632 328 dllhost.exe 28 PID 328 wrote to memory of 1696 328 dllhost.exe 29 PID 328 wrote to memory of 1728 328 dllhost.exe 30 PID 328 wrote to memory of 1744 328 dllhost.exe 31 PID 328 wrote to memory of 1804 328 dllhost.exe 32 PID 328 wrote to memory of 1908 328 dllhost.exe 33 PID 328 wrote to memory of 1944 328 dllhost.exe 34 PID 328 wrote to memory of 1956 328 dllhost.exe 35 PID 328 wrote to memory of 2024 328 dllhost.exe 36 PID 328 wrote to memory of 1824 328 dllhost.exe 37 PID 328 wrote to memory of 2144 328 dllhost.exe 39 PID 328 wrote to memory of 2152 328 dllhost.exe 40 PID 328 wrote to memory of 2272 328 dllhost.exe 41 PID 328 wrote to memory of 2416 328 dllhost.exe 42 PID 328 wrote to memory of 2424 328 dllhost.exe 43 PID 328 wrote to memory of 2596 328 dllhost.exe 44 PID 328 wrote to memory of 2652 328 dllhost.exe 45 PID 328 wrote to memory of 2664 328 dllhost.exe 46 PID 328 wrote to memory of 2676 328 dllhost.exe 47 PID 328 wrote to memory of 2684 328 dllhost.exe 48 PID 328 wrote to memory of 2764 328 dllhost.exe 49 PID 328 wrote to memory of 2816 328 dllhost.exe 50 PID 328 wrote to memory of 2984 328 dllhost.exe 51 PID 328 wrote to memory of 2280 328 dllhost.exe 52 PID 328 wrote to memory of 2644 328 dllhost.exe 53 PID 328 wrote to memory of 3332 328 dllhost.exe 55 PID 328 wrote to memory of 3420 328 dllhost.exe 56 PID 328 wrote to memory of 3552 328 dllhost.exe 57 PID 328 wrote to memory of 3736 328 dllhost.exe 58 PID 328 wrote to memory of 3892 328 dllhost.exe 60 PID 328 wrote to memory of 4104 328 dllhost.exe 62 PID 328 wrote to memory of 4580 328 dllhost.exe 65 PID 328 wrote to memory of 5116 328 dllhost.exe 66 PID 328 wrote to memory of 4700 328 dllhost.exe 67 PID 328 wrote to memory of 4980 328 dllhost.exe 68 PID 328 wrote to memory of 792 328 dllhost.exe 69
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:604
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1016
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{f9d2c77c-6c4f-43a2-aef7-1d8cff191c88}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:328
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:504
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:932
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1108
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2280
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1444
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2764
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1584
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1696
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1944
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2024
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2272
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2416
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2596
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2816
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3332
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3736
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4104
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4580
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:5116
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4980
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:732
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1140
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4160
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2196
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3056
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵PID:2284
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding1⤵PID:3912
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3836
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:3352
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:5052
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2788