Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe
Resource
win10v2004-20240709-en
General
-
Target
4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe
-
Size
163KB
-
MD5
c9ecd9d8da218f635e1e3eb17b36c5ee
-
SHA1
6b14cf165fed4c9162a4eafa318b4fb0c36179ae
-
SHA256
4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac
-
SHA512
3d08906cb93b6fde2ba00b857caba32d5dd6d787fbc9356a310b8bc8688620a0c7f2a39114dbd705f736d5721f6ca613d859ccc3b752f780398146801777be5e
-
SSDEEP
3072:Ie36qVTppS1GzxfExMNtuHBZYyHm836yDlWH7wUoh4V5RuEm9:I+NVTpUkzpEYtuA8qClWUGD
Malware Config
Extracted
discordrat
-
discord_token
MTI0MzQwMTQ3NzkxNDA5OTc0Mg.GWaL1X.yE8UNSG-cUTQGBUsIKtYnV7nQvqnPmErG-61w8
-
server_id
1265998097473994865
Extracted
xworm
serveo.net:8545
-
Install_directory
%AppData%
-
install_file
svbhost.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x002e000000016de2-12.dat family_xworm behavioral1/memory/2116-14-0x0000000000D70000-0x0000000000D8A000-memory.dmp family_xworm -
Discord RAT
A RAT written in C# using Discord as a C2.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1228 powershell.exe 2876 powershell.exe 2848 powershell.exe 1184 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svbhost.lnk svbhost.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svbhost.lnk svbhost.exe -
Executes dropped EXE 4 IoCs
pid Process 2772 LocalSystem.exe 2116 svbhost.exe 1280 svbhost.exe 284 svbhost.exe -
Loads dropped DLL 6 IoCs
pid Process 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 2584 WerFault.exe 2584 WerFault.exe 2584 WerFault.exe 2584 WerFault.exe 2584 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\svbhost = "C:\\Users\\Admin\\AppData\\Roaming\\svbhost.exe" svbhost.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2848 powershell.exe 1184 powershell.exe 1228 powershell.exe 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2116 svbhost.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 1184 powershell.exe Token: SeDebugPrivilege 1228 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe Token: SeDebugPrivilege 2116 svbhost.exe Token: SeDebugPrivilege 1280 svbhost.exe Token: SeDebugPrivilege 284 svbhost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2772 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 30 PID 2680 wrote to memory of 2772 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 30 PID 2680 wrote to memory of 2772 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 30 PID 2680 wrote to memory of 2116 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 31 PID 2680 wrote to memory of 2116 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 31 PID 2680 wrote to memory of 2116 2680 4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe 31 PID 2772 wrote to memory of 2584 2772 LocalSystem.exe 32 PID 2772 wrote to memory of 2584 2772 LocalSystem.exe 32 PID 2772 wrote to memory of 2584 2772 LocalSystem.exe 32 PID 2116 wrote to memory of 2848 2116 svbhost.exe 34 PID 2116 wrote to memory of 2848 2116 svbhost.exe 34 PID 2116 wrote to memory of 2848 2116 svbhost.exe 34 PID 2116 wrote to memory of 1184 2116 svbhost.exe 36 PID 2116 wrote to memory of 1184 2116 svbhost.exe 36 PID 2116 wrote to memory of 1184 2116 svbhost.exe 36 PID 2116 wrote to memory of 1228 2116 svbhost.exe 38 PID 2116 wrote to memory of 1228 2116 svbhost.exe 38 PID 2116 wrote to memory of 1228 2116 svbhost.exe 38 PID 2116 wrote to memory of 2876 2116 svbhost.exe 40 PID 2116 wrote to memory of 2876 2116 svbhost.exe 40 PID 2116 wrote to memory of 2876 2116 svbhost.exe 40 PID 2116 wrote to memory of 2516 2116 svbhost.exe 42 PID 2116 wrote to memory of 2516 2116 svbhost.exe 42 PID 2116 wrote to memory of 2516 2116 svbhost.exe 42 PID 1096 wrote to memory of 1280 1096 taskeng.exe 45 PID 1096 wrote to memory of 1280 1096 taskeng.exe 45 PID 1096 wrote to memory of 1280 1096 taskeng.exe 45 PID 1096 wrote to memory of 284 1096 taskeng.exe 46 PID 1096 wrote to memory of 284 1096 taskeng.exe 46 PID 1096 wrote to memory of 284 1096 taskeng.exe 46 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe"C:\Users\Admin\AppData\Local\Temp\4c411c00b0aba3f592a7528c2b2fd66198b0a70ae32a253a7d6d490d68e7f6ac.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\LocalSystem.exe"C:\Users\Admin\AppData\Roaming\LocalSystem.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2772 -s 5963⤵
- Loads dropped DLL
PID:2584
-
-
-
C:\Users\Admin\AppData\Roaming\svbhost.exe"C:\Users\Admin\AppData\Roaming\svbhost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svbhost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svbhost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\svbhost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svbhost.exe'3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svbhost" /tr "C:\Users\Admin\AppData\Roaming\svbhost.exe"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0E005E90-2DA7-45C1-BA8F-6A346E009BBB} S-1-5-21-1506706701-1246725540-2219210854-1000:MUYDDIIS\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Roaming\svbhost.exeC:\Users\Admin\AppData\Roaming\svbhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Users\Admin\AppData\Roaming\svbhost.exeC:\Users\Admin\AppData\Roaming\svbhost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:284
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56b5c85d9132a0bcf21bf077559f4f371
SHA1173511c732661a6811d92ca2bbcebcccff028866
SHA256b58b33fa282504793c956e630eddfb6b24d12c35541babcfc0552f98d8bf0ee9
SHA51269844bf3f1d20e51396257943bba1d57efd1a62f5432dcbb4049cd79074b9911bb4c64c4acf0b72dce753fed5655d2c170c3e0136dc878ee30b009f40223a5c2
-
Filesize
75KB
MD57b9e7b25acb76ccdd31184a35521ca30
SHA14e4201a3de53645e8c2a5d563a9745a48e08e662
SHA2564ac2e41ebb4502f4196cf5fe03a3c0189f438dbc9088c665078895853831a709
SHA51226c05d17e2b604dbcc438d9ce013aec330707c7fa55f1b7ac545991d43dec8d28efe43b5332703b36e2750b9e52075cf8577af2c09aec89511f643a880486361
-
Filesize
78KB
MD5b6765909918ec4af8352f71968a00b18
SHA12f522c3d40a8b1c92acc6ec7925a899edc033ec3
SHA2562fe459a85bdb8417d41200d611c4e85c838dd8215495d21815da2c8d53bf30a4
SHA512487133b0e085d3d43b4fdda17ebd4a7a58ebf4dd3c4eb0a90b6e0d274cfc6d50357b9a865727c9d68bae9eb27212a87ffa87a3834b76b6594eb558fc720501f4