Analysis
-
max time kernel
1740s -
max time network
1155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2024 08:18
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20240704-en
General
-
Target
Setup.exe
-
Size
78KB
-
MD5
76c5a990442f96d793cdf5145dbe638c
-
SHA1
ba4536aa1a96d3e1cbb6303a259029cbdf55d42b
-
SHA256
22f00720022566cd951ea2b7493fb6438bccffdb2bc8fa76231314b308a64a67
-
SHA512
2e72b9950499ef35807f458122339494b7004a91c563f7eafd7fb87510a895a72ab06f7ec3aed0ab2c20a918813c6cd45a7b899b4483a720616418e2872f8700
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+GUPIC:5Zv5PDwbjNrmAE+GIIC
Malware Config
Extracted
discordrat
-
discord_token
MTI1OTc1MzM2OTYwNjU1Nzc4Nw.GCDjnU.jDuoqMFNc69xbYCpCnnlYm4Tgg5IeLLwnj3hr0
-
server_id
1259782106599522305
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
Processes:
flow ioc 16 discord.com 17 discord.com 21 discord.com 40 discord.com 41 discord.com 46 discord.com -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Setup.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 4228 Setup.exe Token: SeDebugPrivilege 3328 taskmgr.exe Token: SeSystemProfilePrivilege 3328 taskmgr.exe Token: SeCreateGlobalPrivilege 3328 taskmgr.exe Token: 33 3328 taskmgr.exe Token: SeIncBasePriorityPrivilege 3328 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe 3328 taskmgr.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Setup.exedescription pid process target process PID 4228 wrote to memory of 4816 4228 Setup.exe SCHTASKS.exe PID 4228 wrote to memory of 4816 4228 Setup.exe SCHTASKS.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77Setup.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Setup.exe'" /sc onlogon /rl HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:4816
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3328