Resubmissions
23-07-2024 14:26
240723-rscxkaxflf 1023-07-2024 14:20
240723-rnv8cavbjk 1023-07-2024 14:13
240723-rjwnbathkm 10Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23-07-2024 14:13
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240709-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
5ccc8cb73a3e7f49f02309b8234150f7
-
SHA1
2e25a1e3c2dea17b8a55794ea410efc20a20ba89
-
SHA256
96b5be62a3f1c6550f243ce18051af2f6e105cb8e5869d1b685df3e6e382e4ca
-
SHA512
f5aad017d92ad6611aea1c9751e57a4847de36c8e0e40b461b01d3053b30fb563e6258993836f1d193393b95feee6da440352d073d2e1111c2b96186afaafe31
-
SSDEEP
1536:Z2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fBPIC:ZZv5PDwbjNrmAE+fRIC
Malware Config
Extracted
discordrat
-
discord_token
MTI2NTI5NDU0NzA5MzU1MzIwMw.G4XHgH.w73SKG9eGEqZjt7cDrIl25uvvZMMECf3wWXHYA
-
server_id
1265294099100205107
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{DE9CEA31-48FD-11EF-ADD5-E21FB89EE600} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003125cc29be9a0e41b44a3d73dc8faf71000000000200000000001066000000010000200000001885af487fcda5ed449268e03bf12456beea6d3dcdfc9ef805da0cffc0a24c34000000000e80000000020000200000005081ae2c904d5b438e1036f4058c10158d0f9ffca157121769e90eb1e04d0747200000000e6a0886fec9faccfaec73fdb326e757a5ff50d669fa7e0f0737fdfbffcb66324000000003b8f05930ce93a6f4f45572acc41b5f6b9ca74130f8c0a53d1b5ac1d0d985c30eded246d8352f5019ed206708c13931db75edae652b16e55a64b14261c575e6 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "427905935" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03106b30addda01 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2668 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2668 iexplore.exe 2668 iexplore.exe 2768 IEXPLORE.EXE 2768 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2656 2140 Client-built.exe 30 PID 2140 wrote to memory of 2656 2140 Client-built.exe 30 PID 2140 wrote to memory of 2656 2140 Client-built.exe 30 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32 PID 2668 wrote to memory of 2768 2668 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2140 -s 6002⤵PID:2656
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\CopyConvertTo.xht1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2668 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58983473a7edcdd713af31f5b6a223f3f
SHA129fce373aef4cf149d685369aa93e8e2cd851ce5
SHA256b7ba505fc6d7b5def7917c59000768c4ca146d40b84f91c0f5c69170c2fe6866
SHA5125bd97dbaaadd7143daf952b03816e9c05e4af29778cb6c58b8142f01a6349739d23caf4d427c811210075c2c3a92303f13de311d9e8de00fc1055b4a21b26605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6bdf31d950ae72d192de63663b8990c
SHA191f369617a04274b445840c32247ab497895682e
SHA256f7251f4afab004bd92439fb6612254fb8f4a6a10d2dd4060d0f92e318944a19c
SHA512a133b58712c2515aacfbc2d6a5bcf7bb094a7181db418d55766481e0e5f133e487019bcb4d68bc5ef348c9017bfdb8f56d845ef601e370686fa26cbe5b4ba179
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5643e37ef5d91ac1ef07bb57f34ff74dd
SHA1914324b3a1353638acfb90f900d7c1455aed8321
SHA2565f49e8fe70b98d7dd1141df2dd782f99786040e225b2d1a0480d33c9db5dabb2
SHA512b1cf5d42efc2e758590d20e4844c977d1d21ad5f69bb5407be13e96f43aa7f3712ab085c846901ad8826b55503388883957578d275ffd6298df1ffcc4ef74542
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aaaac6616f380f0329c0d9d7f23902ea
SHA1704be227d3c0dbf3ca205fc9b6bcd402f336c45b
SHA2560b3bc44b3bdb0c8904a8e92729b9392ef9ee6478b84a447416f72270c16f39eb
SHA5128de098a7b16f29071909b904057d570c5f8c68128fa1c8f88f8dc17cfd66d37da425e046231d1ac5bd0f307dc41f95abd09db3181f1a62192b1705e1281a80fd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD592fd19903843724afca19b7e6b8f810b
SHA1e49ade9f466b835d348d302c6cfdcf4da45eac53
SHA256690a2cc2b78cd328b22e52a632daab61dce5c41329c29fe86df6dfc0b0d1d49c
SHA5127d08698cb33fd6dcd022c1f059f0af8be8914c9b4ce3ebb515b3f20956a3d1c689e06aee9e9ac5a7695968c2821cd5b8a60af118522e18b50b051beba2a49252
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53b2bd02c8d732c48e2c9a32a6026a09d
SHA1cae49b147f56b41649c0955cd24312d85c4e8a91
SHA256357780c2e0470f96042a41e3aebcc32f0fd33621799468cc49e63b4a6e77891c
SHA5128955cb4899d6c17a075fefc29a228927c66c6131352f910f56ff67538e2b41184c3996fd5d40f99fb2985e9c30919558e00af0016f8318a6f9934cf0a0d806ac
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e951bdc9bb47479568f9ce1ae5083a08
SHA1bc5dc74e00b64ab456616c91947f7ec460d38ead
SHA256781987998a1c0122676b287f23069af4e368d3132564b51c543ea7b1303e64ba
SHA512edc7e791bbd8277debe64fef92639287f2817773f7b1c35442dc98d4522fcc538a74e99cdb11d6578f4e78eb08b39011f5a8c074496c027ea66087e969e4bd12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571984fa0cff1103d13b1f63b3e488cbe
SHA19c1c4c6e0af112df68dc138ee46dada342f8476b
SHA256a980e5b658a56db9b6492a416a111979a5d7823060f14e416e4cc0172b002e17
SHA512a435748f9e8f71f53ed5b0d78f511fddbeb9e36d72617529a3d1ab21ff2b7e8c1c5f457f8f158d6f0eeb31b005f177f096f1ecd163023656787907c63ca2a802
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0fb62a150a30fa6d677ebe55f3f40bc
SHA1832b74fd6c49bf508d1dd3d564aadd363b451145
SHA2561960e5715a23778e8162aaf5604658d61165be611710bf470bdab6c7f107d790
SHA512d82f63a907e790ef5ad4e5132977a9ee20adb8bbc93604ee9046ecd91e49d6eb6c0daf369ec036382cae5b82fc75f7488518a110349c06e735c701cff26e091c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f94c2d70cccc6b9a82296a52fc0f1815
SHA1cde4d8d97c8de28eb7a4ff4b085022120bfce5f1
SHA2568828d1530385648a92a9df5a648a26a31f403d360da68bf3c286713fb1972206
SHA512612b0be10141c50489ed9122a246e181115a7ee1fa31bfd973f0175a4659d5bc8962831318ca999f69bba5201a0e8eea4de8d46fd9a57ba6f98a0696eab0e564
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12747a8f01292c22fa30a93af86061a
SHA1809df60b6e99e6ecb45a876baa138f7b0fd390b9
SHA2561a727fc2394fca80e15efdd0bf08bf2a6b3b357ddbf30c364450c4e5e0daf5af
SHA5120b3d6289e1cacc20ea1fc6b28a08e599b1e3ef3f3a4cac1bdbc66ed9fbd499ed3dced5c3f07af1678766d86b8e7e1b7de10b84f94202fbfd50d14a71eae4d9a5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d05ee79584d26742358c08354bf532f7
SHA1fd0b425c9fc726c60d91caeb5e313254e0e87d24
SHA2564c83a74502812134706b8af9218749b2ba22f066beb3e5ab563aec2e03e2931c
SHA512971e42ec9fe0801a5b247aed27147793f3f8ee70a334fc04c9f7982acb28460f785d2e59085721da29a20a11a5a3b4da3326b50d71e8b5b349ff7464f6e690b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6849c97043161b32827f9840a6a92d0
SHA1c590e14148b4980afd0ffefd92f494838638ffc5
SHA256cf30463b81b475e4ed7e60f85d01a95911ba0f309efb71c1c040b81cf7c66329
SHA51232e3addb3964672e4d66a71248c114c2413f919fb461d6fdeafd38df8c680fb4ad80c90a74e5657d1daf1b06092669941cf9e8c98863eb42f1df3c233611c61a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e88f8023820c0478d0e29ed59abad4f2
SHA1d703f2645e340f2f2e59b18605c9e378370e85c9
SHA256b8d9a93665af14ddcecdb519f604adc2dc9811862b8b5840580b1926d4a81fa0
SHA512df1b6eef551b3ba5a7158c86411611c157b7c66c6ca4e82553c686d8e67569a349f930751029b0bc512d610801f8bd4b395257cda8ae9b5e101d2d972467587e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54539f8ba3f9ac290c7318e2b816ca169
SHA15ff355416015aaea5acb04a977e4a3c2052d8af8
SHA256a4c5cbc9ceb4f6bd14b96e5f0cca981a739170cdc58538168c1ec7fb3a8323e7
SHA512beb46cfeab4930ed67486a980d318981cf0348acaddeaea6ba756a537be825b002d3975870b3df7fd6edbb396b9813fb87f71c781473d42d978159f0f0793029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55da074d414353f4675e0f163cd71b2ea
SHA18d783a812b389e479c004f08542530f519d78880
SHA256704dc2b47b9de1f2ea9c1acbe0d335925c975aa7f7f190eccfd526febf60588a
SHA512a4015895d1ee4fe05f7d41dfda731654ca42751f113518356d1a98c3eb6bb8f285de3cf72e577c738fd107bd49a2554e488a5256d577ae5068b5b8e88869e592
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD523a93fe266523e9a9d9333c40aca9788
SHA1c1137058d081e9d9cfe8b98d3953d85f988da6da
SHA256b82e0fe339573821eef374818f0275ef8c411bd083ba04fe16a457ef43583ed2
SHA5129c85d3efeb7bb9cb89a90f03f9a87596235492a47d28e7c1493bfe1b7d4410436f3d8a77e1e3bd605e8abcba4c58d7e669f10ead7619c4742e7b0462599c2c2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD500614a8467e6115a4efc0414f38d7466
SHA1e0a43b61e75f8b9f33607e8a396f132f0d86e794
SHA2567c8284f40aa1e86540b5ef9003eef9691e22dc2dbbe0ebe58b856ce67c441fe8
SHA5126f910b19258a0d6626252c101915630971daa51e28833be12c84485103bcb6924a23eca5b025852261f620b4a5f197a158525deeb8c979edc41dac8b052de476
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aa20519685e1af195075928232df5259
SHA17d3d9a3127c230986a3a5cc9e242e6d6dce61e5a
SHA256d5b0adcd904a5b68b86bdda298b9057044ffc58ec97ef96a40c609231d501eb7
SHA512781da4ab4febff906b502e55ef11fb7c30ffffdfa59db89c901fe87b08297e25458c3f86b141ef5eefdabc52c052c3b5035fbe52ca9300de88322b401be5c935
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b