Analysis
-
max time kernel
49s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 14:42
Behavioral task
behavioral1
Sample
redengine.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
redengine.exe
Resource
win10v2004-20240709-en
General
-
Target
redengine.exe
-
Size
78KB
-
MD5
d190aafd5cd1752db1815f4677088807
-
SHA1
262a4260a8acab24193f307c019104e83b30a858
-
SHA256
aa4fd9b40ed3ddf4cb2b38554a3ad0344e11c34a873273bdcfdb053cbbec5057
-
SHA512
4ea0399b0760e6d0a19ad2b15fbd27e21cd86dcd6c64994bbfc3f57a8eeef6a475a37fe9189b44e19b331d4422af7b11dc95f1e9337292ac137137e5f10e24f8
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Malware Config
Extracted
discordrat
-
discord_token
MTI2MjA0OTgwODEzOTQyMzc0NA.GaQfYG.7LGcj-W5XtFYi4iORWstYkVS-Wd--pdFC-lFPI
-
server_id
1262046756489793698
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4272 redengine.exe Token: SeDebugPrivilege 4012 taskmgr.exe Token: SeSystemProfilePrivilege 4012 taskmgr.exe Token: SeCreateGlobalPrivilege 4012 taskmgr.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe 4012 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\redengine.exe"C:\Users\Admin\AppData\Local\Temp\redengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4012