Analysis
-
max time kernel
1050s -
max time network
1035s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 06:32
Behavioral task
behavioral1
Sample
Terror.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
Terror.exe
Resource
win11-20240611-en
General
-
Target
Terror.exe
-
Size
78KB
-
MD5
9f518ee6480156a921f6bd99c8378c62
-
SHA1
4c9abca52fc4ded0a3a0d472b080ddf65833f0f5
-
SHA256
efe5790a81067b8b95ad69af4968849c791b01a1a0f19f3d3020095f00888b6e
-
SHA512
652d15a5dbdcac35ab28747778512d5fb5e53768b58cdaa0eecf9f7beb392ee23700ab9f59c861455740363c9189555f5b02d5e0c2f9a4bf3c2fedb0642e7bca
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+SPIC:5Zv5PDwbjNrmAE+eIC
Malware Config
Extracted
discordrat
-
discord_token
MTE3ODk2MTk2ODE2NjYwODk0Ng.GWdouc.4wVIpzQHPLktLaKdKYTuprn3lAPEaFf0XdTsNg
-
server_id
1256966724407001190
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1920 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Terror.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 1872 Terror.exe Token: SeDebugPrivilege 1920 taskmgr.exe Token: SeSystemProfilePrivilege 1920 taskmgr.exe Token: SeCreateGlobalPrivilege 1920 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe 1920 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Terror.exe"C:\Users\Admin\AppData\Local\Temp\Terror.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1524
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:3956