Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
18-07-2024 12:17
Behavioral task
behavioral1
Sample
rename me like you want.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
rename me like you want.exe
-
Size
78KB
-
MD5
0e3aa14a75e34fe78f2f34cef04fc306
-
SHA1
de3e2ff090feb2997cc3e5e5bf5f7befb6332cfd
-
SHA256
6add89430560ce74f38b67e899f84957d9b72304f0986064d1b1750b0cbbb757
-
SHA512
1fd0c2eb6f67efa8cf1c330879c70ef18b82d03c82592209e1faa2c6beb4b7c190e85876741f0442d74b7fb51cdd2de521fd49f23f637d96290b347630efe9dc
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2PIC:5Zv5PDwbjNrmAE+yIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI0MjUxOTc4MjA1ODc1ODIxNA.Gs3KCo.pRR6LWIieDTzclnGtAlZgdJS7_T0WMTb0HGkpM
-
server_id
1242352007009009704
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 212 rename me like you want.exe Token: SeDebugPrivilege 1416 taskmgr.exe Token: SeSystemProfilePrivilege 1416 taskmgr.exe Token: SeCreateGlobalPrivilege 1416 taskmgr.exe Token: 33 1416 taskmgr.exe Token: SeIncBasePriorityPrivilege 1416 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe 1416 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\rename me like you want.exe"C:\Users\Admin\AppData\Local\Temp\rename me like you want.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:212
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1196
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1416