Analysis

  • max time kernel
    80s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 14:10

Errors

Reason
Machine shutdown

General

  • Target

    bypasser/bypasser_final.exe

  • Size

    135KB

  • MD5

    a1288b1ec6fb4da4f55dc8fd53a6c4ce

  • SHA1

    bead8a51b0c34f981a4b278681f63f3b88f9ad54

  • SHA256

    f7dd8d7d380e311b86e9fb2d61b63eb212e70f5e8e51acdbf47a1dd4ed051891

  • SHA512

    2fa5aa3a0d4daaa57854a9045a12b7e01a0f9864924cde12935646b25f172c787b120bdaac65be85ebe442476c2c1f45b51b737ddbbd2579cf6416e65ab038a2

  • SSDEEP

    1536:2vdWSVRVDlOzjRzrksAOO2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+pPICsov:2MSncRzAOOZv5PDwbjNrmAE+ZICsov

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI1MTMwNDM5NDkzNTUwNTA4Nw.GXLWWL.r7OUns0sCMr5I9ra_FffjxEK2E7LukBojfJIT8

  • server_id

    1256804931839459358

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bypasser\bypasser_final.exe
    "C:\Users\Admin\AppData\Local\Temp\bypasser\bypasser_final.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE
      "C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2528
      • C:\Windows\System32\shutdown.exe
        "C:\Windows\System32\shutdown.exe" /s /t 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1788
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1420
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39a0055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:3028

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE
    Filesize

    78KB

    MD5

    a654392da078edaa1e15edf5037892af

    SHA1

    7e46cf31017813ef3965ee4b0b4dc1cb8467eaf5

    SHA256

    e8c4b3c1bf31627789ae496bda5014524cc6304c2f0b31f592cb4ce82703269c

    SHA512

    3caf159430d00b513cfe2c1221f39643f00b018c0af7952c9a3c0fee43c9aacf3b0c55846ef137c66fa6c8c5c9b007d3f87c013d1de61811da22a9ad7d66d9dc

  • memory/2528-13-0x00007FFF04093000-0x00007FFF04095000-memory.dmp
    Filesize

    8KB

  • memory/2528-12-0x0000015D78560000-0x0000015D78578000-memory.dmp
    Filesize

    96KB

  • memory/2528-15-0x0000015D7AC60000-0x0000015D7AE22000-memory.dmp
    Filesize

    1.8MB

  • memory/2528-16-0x00007FFF04090000-0x00007FFF04B51000-memory.dmp
    Filesize

    10.8MB

  • memory/2528-17-0x0000015D7B540000-0x0000015D7BA68000-memory.dmp
    Filesize

    5.2MB

  • memory/2528-18-0x00007FFF04093000-0x00007FFF04095000-memory.dmp
    Filesize

    8KB

  • memory/2528-19-0x00007FFF04090000-0x00007FFF04B51000-memory.dmp
    Filesize

    10.8MB

  • memory/2528-20-0x00007FFF04090000-0x00007FFF04B51000-memory.dmp
    Filesize

    10.8MB