Resubmissions
03-07-2024 18:30
240703-w5swrstene 1003-07-2024 17:15
240703-vs16yazcmr 1003-07-2024 17:09
240703-vn4fhazblk 10Analysis
-
max time kernel
130s -
max time network
131s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-07-2024 17:09
Behavioral task
behavioral1
Sample
keep safe.exe
Resource
win11-20240611-en
windows11-21h2-x64
11 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
keep safe.exe
-
Size
78KB
-
MD5
161e7e7c7c33737fa13cf299f5de7bf8
-
SHA1
c159f9f2822c45e4f79de8fb59bb19e7e8ee36b1
-
SHA256
575eda3b9431c8a303be6c734aa85e4bc1b27d547b3f758f71f937d96ef3a50d
-
SHA512
01ad7f71e02da53088f58f0ee6c02a0d378d9dcd6a0ff61f4f27910681ef8de1a2641e70716e4b77c79ab2a313bcc1afdca0d1bf36e4e2bfe1d0e13fb5ae8f8d
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+KPIC:5Zv5PDwbjNrmAE+WIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTIzNDIwMzg4MDI0MjU0ODc4OQ.GnCtHh.ILBrbeZaD2WcnKYL9n7q5C3RNZnunVB1vxbYdM
-
server_id
1249930029291536444
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2960 created 628 2960 keep safe.exe 5 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 16 IoCs
flow ioc 1 raw.githubusercontent.com 8 discord.com 10 discord.com 15 discord.com 18 discord.com 1 discord.com 6 discord.com 7 discord.com 17 raw.githubusercontent.com 9 discord.com 11 raw.githubusercontent.com 14 raw.githubusercontent.com 19 discord.com 4 discord.com 12 discord.com 13 discord.com -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4KernelMode.evtx svchost.exe File opened for modification C:\Windows\System32\Winevt\Logs\Microsoft-Windows-Security-Mitigations%4UserMode.evtx svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Office\16.0\officeclicktorun.exe_Rules.xml OfficeClickToRun.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2960 set thread context of 3292 2960 keep safe.exe 81 -
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key deleted \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSTagIds0 = "5804129,7202269,17110992,41484365,39965824,7153487,17110988,508368333,17962391,17962392,3462423,3702920,3700754,3965062,4297094,7153421,18716193,7153435,7202265,20502174,6308191,18407617" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe = "Wed, 03 Jul 2024 17:10:50 GMT" OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\RulesEndpoint = "https://nexusrules.officeapps.live.com/nexus/rules?Application=officeclicktorun.exe&Version=16.0.12527.20470&ClientId={0F1BD8C9-E5A5-412F-BDFB-E6B3B5C5285E}&OSEnvironment=10&MsoAppId=37&AudienceName=Production&AudienceGroup=Production&AppVersion=16.0.12527.20470&" OfficeClickToRun.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\MICROSOFT\OFFICE\16.0\COMMON\CLIENTTELEMETRY\RULESMETADATA\OFFICECLICKTORUN.EXE\ULSMONITOR OfficeClickToRun.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe\ULSMonitor\ULSCategoriesSeverities = "1329 10,1329 50,1329 15,1329 100,1329 6" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesLastModified\officeclicktorun.exe_queried = "1720026650" OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata\officeclicktorun.exe OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0 OfficeClickToRun.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Office\16.0\Common\ClientTelemetry\RulesMetadata OfficeClickToRun.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2960 keep safe.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 2960 keep safe.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 2960 keep safe.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 2960 keep safe.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 2960 keep safe.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 2960 keep safe.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe 3292 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2960 keep safe.exe Token: SeDebugPrivilege 2960 keep safe.exe Token: SeDebugPrivilege 3292 dllhost.exe Token: SeShutdownPrivilege 2960 keep safe.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3880 RuntimeBroker.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 2960 wrote to memory of 3292 2960 keep safe.exe 81 PID 3292 wrote to memory of 628 3292 dllhost.exe 5 PID 3292 wrote to memory of 688 3292 dllhost.exe 7 PID 3292 wrote to memory of 992 3292 dllhost.exe 12 PID 3292 wrote to memory of 428 3292 dllhost.exe 13 PID 3292 wrote to memory of 536 3292 dllhost.exe 14 PID 3292 wrote to memory of 1040 3292 dllhost.exe 15 PID 3292 wrote to memory of 1084 3292 dllhost.exe 16 PID 3292 wrote to memory of 1092 3292 dllhost.exe 17 PID 3292 wrote to memory of 1128 3292 dllhost.exe 18 PID 3292 wrote to memory of 1188 3292 dllhost.exe 20 PID 3292 wrote to memory of 1240 3292 dllhost.exe 21 PID 3292 wrote to memory of 1256 3292 dllhost.exe 22 PID 3292 wrote to memory of 1376 3292 dllhost.exe 23 PID 3292 wrote to memory of 1444 3292 dllhost.exe 24 PID 3292 wrote to memory of 1472 3292 dllhost.exe 25 PID 3292 wrote to memory of 1616 3292 dllhost.exe 26 PID 3292 wrote to memory of 1632 3292 dllhost.exe 27 PID 3292 wrote to memory of 1660 3292 dllhost.exe 28 PID 3292 wrote to memory of 1744 3292 dllhost.exe 29 PID 3292 wrote to memory of 1776 3292 dllhost.exe 30 PID 3292 wrote to memory of 1832 3292 dllhost.exe 31 PID 3292 wrote to memory of 1940 3292 dllhost.exe 32 PID 3292 wrote to memory of 1992 3292 dllhost.exe 33 PID 3292 wrote to memory of 2004 3292 dllhost.exe 34 PID 3292 wrote to memory of 1232 3292 dllhost.exe 35 PID 3292 wrote to memory of 2052 3292 dllhost.exe 36 PID 3292 wrote to memory of 2180 3292 dllhost.exe 37 PID 3292 wrote to memory of 2300 3292 dllhost.exe 39 PID 3292 wrote to memory of 2388 3292 dllhost.exe 40 PID 3292 wrote to memory of 2460 3292 dllhost.exe 41 PID 3292 wrote to memory of 2472 3292 dllhost.exe 42 PID 3292 wrote to memory of 2488 3292 dllhost.exe 43 PID 3292 wrote to memory of 2564 3292 dllhost.exe 44 PID 3292 wrote to memory of 2592 3292 dllhost.exe 45 PID 3292 wrote to memory of 2616 3292 dllhost.exe 46 PID 3292 wrote to memory of 2624 3292 dllhost.exe 47 PID 3292 wrote to memory of 2632 3292 dllhost.exe 48 PID 3292 wrote to memory of 724 3292 dllhost.exe 49 PID 3292 wrote to memory of 2516 3292 dllhost.exe 50 PID 3292 wrote to memory of 2828 3292 dllhost.exe 51 PID 3292 wrote to memory of 3328 3292 dllhost.exe 52 PID 3292 wrote to memory of 3460 3292 dllhost.exe 53 PID 3292 wrote to memory of 3488 3292 dllhost.exe 54 PID 3292 wrote to memory of 3880 3292 dllhost.exe 57 PID 3292 wrote to memory of 3964 3292 dllhost.exe 58 PID 3292 wrote to memory of 4012 3292 dllhost.exe 59 PID 3292 wrote to memory of 4072 3292 dllhost.exe 60 PID 3292 wrote to memory of 4304 3292 dllhost.exe 61 PID 3292 wrote to memory of 4488 3292 dllhost.exe 62 PID 3292 wrote to memory of 4292 3292 dllhost.exe 64 PID 3292 wrote to memory of 1384 3292 dllhost.exe 65 PID 3292 wrote to memory of 2728 3292 dllhost.exe 67 PID 3292 wrote to memory of 1964 3292 dllhost.exe 69
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:628
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:428
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{bd881ab9-19f5-4d75-9a11-a884062df878}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3292
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:536
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1084
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1092
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1188
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1240
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netprofm -p -s netprofm1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1376
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:724
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵
- Drops file in System32 directory
PID:1472
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1632
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:1660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1744
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1832
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1940
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1992
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:2004
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1232
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2052
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2180
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2300
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p1⤵PID:2488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2564
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2632
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2828
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\keep safe.exe"C:\Users\Admin\AppData\Local\Temp\keep safe.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2960
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3488
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Suspicious use of UnmapMainImage
PID:3880
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3964
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4012
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UdkSvcGroup -s UdkUserSvc1⤵PID:4072
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{973D20D7-562D-44B9-B70B-5A0F49CCDF3F}1⤵PID:4304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k osprivacy -p -s camsvc1⤵PID:4488
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:4292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:1384
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:2728
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:1964
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1496
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:2848
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4432