Analysis
-
max time kernel
1477s -
max time network
1777s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
04-07-2024 08:32
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240611-en
windows11-21h2-x64
5 signatures
1800 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
47e27fe6c24d12e2a430ba5954110af8
-
SHA1
dd2b8be1df875fd0ad4ae8fa0cd154b220744461
-
SHA256
4c8e733771f1fa36c2607d319954f2f811b8690861ef556947e78c5540e98021
-
SHA512
655539eb993cb59bff8937b2e21e699ad01fa39f0f605708559afee01a0f6d35c7d99d7d03cc2eb44e691bb4851fa7d140838016fe006f74a20e4569a196de2c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+4PIC:5Zv5PDwbjNrmAE+cIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI1NTUzNzM1MTgwMzgwMTYwNA.Gaum03.OIWIumUQ6-odVL7pZDOGnAoFrwedhUBhG-Lngk
-
server_id
1255536373763539074
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 1 discord.com 3 discord.com 6 discord.com 7 discord.com 8 discord.com 45 discord.com 50 discord.com 51 discord.com -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2808 Client-built.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2952 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4084
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:1672
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:1372