Analysis
-
max time kernel
128s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2024 13:37
Behavioral task
behavioral1
Sample
cheat.exe
Resource
win10v2004-20240709-en
General
-
Target
cheat.exe
-
Size
88KB
-
MD5
a98dbae8957909fe8473f3fc87cc004e
-
SHA1
e8d7943e1b09f33c0066504dc89174429e0decfd
-
SHA256
097413e6718d4137d1c5d6373dff3c1275e297416e48bd1de2a26115d19d0a01
-
SHA512
89d62e3541d777a3b7c181fbfcfca3ff3ccd8368fc49e2d6ee964415c285ae140c693bc2fb94109fee121d19be2c1ad27633dac896dd6b1673a64dca42f5088d
-
SSDEEP
1536:x+2MeT1KWKE55WGMb1PpT+PWXjsnUToZbcNr1+uexCxoKV6+fNGOtOJK:xd7K9S5WGePZVjsnaoZbcNr1+bSNxtOM
Malware Config
Extracted
discordrat
-
discord_token
MTI2NDU3NjcxNjE5MDM4ODMwNA.GpIbGF.K6DwbwuTOkE9RNx3unenrnY5Hc4a8t36roOLZw
-
server_id
1264576524019830834
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 1 IoCs
Processes:
taskmgr.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskmgr.exepid process 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
cheat.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 3656 cheat.exe Token: SeDebugPrivilege 4320 taskmgr.exe Token: SeSystemProfilePrivilege 4320 taskmgr.exe Token: SeCreateGlobalPrivilege 4320 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
taskmgr.exepid process 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
taskmgr.exepid process 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe 4320 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cheat.exe"C:\Users\Admin\AppData\Local\Temp\cheat.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4320
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5000