Resubmissions
22-07-2024 18:50
240722-xhabkssbmb 1022-07-2024 18:44
240722-xdxlbasdnk 1022-07-2024 18:41
240722-xbzb5a1gjg 1022-07-2024 18:38
240722-xaew4asbll 10Analysis
-
max time kernel
97s -
max time network
127s -
platform
windows11-21h2_x64 -
resource
win11-20240709-en -
resource tags
arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-07-2024 18:41
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240709-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
5d124e382b6e75350e290f2ca92dcd8f
-
SHA1
1453d068d2d1a5c02696f82c148c91d749c99e68
-
SHA256
0cdf3658260f5e4abb0cc840fb3038d189015d07d9e82f5301a4410fd739e4b9
-
SHA512
41f012b71fa8543fb91a2f30c96defa0d614b917de5b9abed85eb3f11a6643b7c3038574887e399e609f0308b8442a77c07bfae1d442e0810e26a05d5c2c846f
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+4PIC:5Zv5PDwbjNrmAE+cIC
Malware Config
Extracted
discordrat
-
discord_token
MTI2NTAxMTgwMzUyMDI0MTgyNg.Gixgjj.XDPqCHG2EZuhXeegiOPwvU_Lk4mudkLkpJ6VOU
-
server_id
1265010770744443021
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 discord.com 4 discord.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3866437728-1832012455-4133739663-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4616 Client-built.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1192 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4616
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD56eb9e667030a3414a9dd177950bff298
SHA1b8b9a6b672bf720efdebd893c1be6056231e87d3
SHA2565ea4f46bf6ba39af1e5c39796acef76712d354fab1d190cb2424cd63331566da
SHA5124ba41fbd6202554c12351ccd1acfdf1f49e0a546fc2677e91fa20be8998615d4c41c0b841bc97b7b03f9ec5ecd61a261136539ff5121f839030509a69228b779
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5aa1db56ffcb4b44e29bae43c70e6f3c6
SHA1f057d9514a4da16a42028bb1ab1da42000ac2059
SHA256b4d4b3bde87559d205c05d5d8d3b79940972bc823a9e40464d7e76e38348b175
SHA5129ade68a2e0c2184c7ba4d68fa1eef20f809119bf7ed46bb81ef6209c2d9ae874c5c3dd9533eeac43c6fd5ffcedd1d601dd5b91bef824f22fdd956b9cb96920c9