Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 14:12
Behavioral task
behavioral1
Sample
redengine.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
redengine.exe
Resource
win10v2004-20240709-en
General
-
Target
redengine.exe
-
Size
78KB
-
MD5
d190aafd5cd1752db1815f4677088807
-
SHA1
262a4260a8acab24193f307c019104e83b30a858
-
SHA256
aa4fd9b40ed3ddf4cb2b38554a3ad0344e11c34a873273bdcfdb053cbbec5057
-
SHA512
4ea0399b0760e6d0a19ad2b15fbd27e21cd86dcd6c64994bbfc3f57a8eeef6a475a37fe9189b44e19b331d4422af7b11dc95f1e9337292ac137137e5f10e24f8
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+jPIC:5Zv5PDwbjNrmAE+7IC
Malware Config
Extracted
discordrat
-
discord_token
MTI2MjA0OTgwODEzOTQyMzc0NA.GaQfYG.7LGcj-W5XtFYi4iORWstYkVS-Wd--pdFC-lFPI
-
server_id
1262046756489793698
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
taskmgr.exepid process 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
redengine.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 4492 redengine.exe Token: SeDebugPrivilege 1184 taskmgr.exe Token: SeSystemProfilePrivilege 1184 taskmgr.exe Token: SeCreateGlobalPrivilege 1184 taskmgr.exe Token: 33 1184 taskmgr.exe Token: SeIncBasePriorityPrivilege 1184 taskmgr.exe -
Suspicious use of FindShellTrayWindow 55 IoCs
Processes:
taskmgr.exepid process 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe -
Suspicious use of SendNotifyMessage 55 IoCs
Processes:
taskmgr.exepid process 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe 1184 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\redengine.exe"C:\Users\Admin\AppData\Local\Temp\redengine.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1184
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3288
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵PID:384