Overview
overview
10Static
static
3DontBearWi...ng.exe
windows7-x64
10DontBearWi...ng.exe
windows10-2004-x64
10DontBearWi...on.dll
windows7-x64
1DontBearWi...on.dll
windows10-2004-x64
1DontBearWi...rl.dll
windows7-x64
1DontBearWi...rl.dll
windows10-2004-x64
1DontBearWi...sh.dll
windows7-x64
1DontBearWi...sh.dll
windows10-2004-x64
1DontBearWi...b1.dll
windows7-x64
1DontBearWi...b1.dll
windows10-2004-x64
1DontBearWi...td.dll
windows7-x64
1DontBearWi...td.dll
windows10-2004-x64
1Analysis
-
max time kernel
161s -
max time network
249s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 12:15
Static task
static1
Behavioral task
behavioral1
Sample
DontBearWithCheaters/EasyCheating.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
DontBearWithCheaters/EasyCheating.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
DontBearWithCheaters/execution.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
DontBearWithCheaters/execution.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
DontBearWithCheaters/libcurl.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
DontBearWithCheaters/libcurl.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
DontBearWithCheaters/xxhash.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
DontBearWithCheaters/xxhash.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
DontBearWithCheaters/zlib1.dll
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
DontBearWithCheaters/zlib1.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
DontBearWithCheaters/zstd.dll
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
DontBearWithCheaters/zstd.dll
Resource
win10v2004-20240802-en
General
-
Target
DontBearWithCheaters/EasyCheating.exe
-
Size
50KB
-
MD5
a262aecc8e8dc29650ff5e11d7b3c276
-
SHA1
c6dc0c79fc0616fc7ba0d58e005bb2c62c9f8012
-
SHA256
5807ce4e87716a5bc909df73c563dd643da24a01704e15db6b6d638850c585ea
-
SHA512
993f6cb26939417567be9c739cba44553cd4b2e9d27d158031aafe6c7baa46b9b35e285b0a9294788d8d055b121be19d6f09f8f693f9eccaa06ad18804726b07
-
SSDEEP
768:Tmr2rBQ1wWOQgdSR8qKugZa3lbaxgGjX0/o9Bv60mifhhIZtWLqiO:qAwwFQgEBC03haxfk/G160XInWLY
Malware Config
Extracted
discordrat
-
discord_token
MTEyMTQyMDgwMTYyNzkyMjU3Mw.G4jNQO.MglsuiS1ldNvX29tR2kywKn8IorYGQT7wUNojo
-
server_id
1271887603272122468
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 discord.com 12 discord.com -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4352 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4352 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1664 EasyCheating.exe Token: SeManageVolumePrivilege 2992 svchost.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe 4352 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4352 vlc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DontBearWithCheaters\EasyCheating.exe"C:\Users\Admin\AppData\Local\Temp\DontBearWithCheaters\EasyCheating.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SearchStep.au"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService1⤵PID:4788