Analysis
-
max time kernel
436s -
max time network
1202s -
platform
windows11-21h2_x64 -
resource
win11-20240704-en -
resource tags
arch:x64arch:x86image:win11-20240704-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-07-2024 08:25
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240704-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
e73dde8cadfeacc37972c1b00c42eafc
-
SHA1
105622094f03b4872945dbca9b44b45a590e78d6
-
SHA256
97c7ae8ac391e08c3444a4ae7dc0d6495108480b99abb7471de808b179f4af96
-
SHA512
293921cea9c01cedb79d58475a38a3a071ef4695717ca5fc0cd32572be9fa9b79c37b8ba3e00a8c4066989e97bd588a633df563fb9909ac26097a0246e632299
-
SSDEEP
1536:52WjO8XeEXF95P7v88wbjNrfxCXhRoKV6+V+nkPIC:5ZT5PDwbjNrmAE+n4IC
Malware Config
Extracted
discordrat
-
discord_token
MTI0NzY5MDU1NzMxNzE4OTY4Mg.GyYj7a.-_zHa0DX8IUmeV5V7lgI2Zu9LJMJB_rP88vRLU
-
server_id
brk9yMXHktZqUD2AbKIm56v4q38xL6py
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3119450053-3073099215-1938054741-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Client-built.exedescription pid process Token: SeDebugPrivilege 1084 Client-built.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 3972 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3972
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD500d55e92419b7a500fac6fbff94aeab6
SHA185c20b3b1230158f73d1da99f8cb539bd0f1b1bd
SHA2564fb34ca1daed6bd2f358a2529dfe2d60c546c4c1bda5e9a7c61a65418f76d321
SHA512cefb98597ece4f6f8802dca0c16fcc8812e523dcb7853ff15888ea125b87e3ae1436de10cd9c23e9bd3a5ce236273b6d9b07824bcb51432ae94708587810c521
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD55660dec6d17c4d73cf0ccd78f7b8297b
SHA1cb8a2e6d8f5e7e931867d284f97dc0dcf039baff
SHA256771d63aaabf3443c385554c7ae6d1e64d35d5e82d6dffc42ee4808ae66716c8f
SHA5122fc21e58402d35901911b13122e7a6903afb42613ee2477b72fc93e9e49dac148ef2859d62e8f799c79ca29a457ce6a94ba30bc7b94aa805ba1c7f2331182d70