Analysis
-
max time kernel
140s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 19:39
Behavioral task
behavioral1
Sample
SalesAndTales/SalesAndTales/TalesAndSales.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
SalesAndTales/SalesAndTales/TalesAndSales.exe
Resource
win10v2004-20240709-en
General
-
Target
SalesAndTales/SalesAndTales/TalesAndSales.exe
-
Size
4.1MB
-
MD5
5071e6c3739ca8d176036501ff7b7692
-
SHA1
0e0ef970dc94a375a28b61baff395043c920484b
-
SHA256
dc8d4767a1022103802ec64fe86960bea13dd03ff1d0365c2519c7edc07b4841
-
SHA512
1c9e56a50ac7a3ee175d70b1e456cd69279fe94aac95ea66f4d1f782d2687b33f9c7b0a20d29a49ed06508279dc34f2d4d05ad5fb396a526226e27e93614753f
-
SSDEEP
98304:iUYt9cvtfCbuDlZM5Arxle1K+O9FbcBvzc8aEB:iUc9cv9EQ7oOx01awV
Malware Config
Extracted
discordrat
-
discord_token
MTI2MDIzODIzNTAxNjM2NDE0Mw.G_GGTS.fEW6l1WLOhjwEn42Roi-bpXTe-ZL_rK7J-jOto
-
server_id
1260238572166844487
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TalesAndSales.exe -
Disables Task Manager via registry modification
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TalesAndSales.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TalesAndSales.exe -
resource yara_rule behavioral2/memory/2420-9-0x00007FF70F610000-0x00007FF71014E000-memory.dmp themida behavioral2/memory/2420-10-0x00007FF70F610000-0x00007FF71014E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TalesAndSales.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 17 discord.com 22 discord.com 27 discord.com 13 discord.com 14 discord.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2420 TalesAndSales.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4948 SCHTASKS.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2420 TalesAndSales.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2420 wrote to memory of 4948 2420 TalesAndSales.exe 87 PID 2420 wrote to memory of 4948 2420 TalesAndSales.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SalesAndTales\SalesAndTales\TalesAndSales.exe"C:\Users\Admin\AppData\Local\Temp\SalesAndTales\SalesAndTales\TalesAndSales.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77TalesAndSales.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\SalesAndTales\SalesAndTales\TalesAndSales.exe'" /sc onlogon /rl HIGHEST2⤵
- Scheduled Task/Job: Scheduled Task
PID:4948
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵PID:2224