Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24-08-2024 19:59

Errors

Reason
Machine shutdown

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    83860ce9cc1369a52dfad93b0659236e

  • SHA1

    277b1829c218f836276b5e6d844ed820456ddc59

  • SHA256

    f78df045a1f41bde435087881f57c55e551243a4be268d7ff78235586c1296b0

  • SHA512

    7b72754d9cda2ed1635ce711769617d91ce19937d0179f39135364a3de35e024c0b4a17be501592be490327dff1f127d088bf7a0090f2f97d9c5dec83189d795

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+sPIC:5Zv5PDwbjNrmAE+AIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI3Njg3MTgxNTM2MDE1NTcwOQ.GtSM3s.iKkBaqRKjxMJKm4ntalWWpJ9qXsmZ2KwMVLgCs

  • server_id

    1276870976394498060

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3716
  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2184
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa3947055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:2440

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    f8f606a032719f0447a78d9b50fb672f

    SHA1

    45d741cb2185064eb8c06a91d79c928fcb657abe

    SHA256

    d5e5bb3e87ef84f4e352d277fbe38a57f65ed50c0f8309dbff43d57af778b3ca

    SHA512

    96169b9bcfce9f671452010340d707e2dd3a60a1ba2847cccbf1fff2dd11d0f74dfdc74cb9c20015bdbe95479f52501f9ee30ac634f547006104fba349472b65

  • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

    Filesize

    10KB

    MD5

    27152171537c47796aa7194ac41383bc

    SHA1

    430c380ea885fce765a771cc40cbfe6358b4d04c

    SHA256

    28276ad4adb3f540918a28a722f10a63406037b96a14e05565e31ec90c605c22

    SHA512

    044ded8d45d2249f69ae617768398a33cf060618f1cb583aa9d9a34171de10bf3e23f6e49b3c0b8ca872f5ecbe98e841168fb3e94fdef2efbb299a3cbc01f616

  • memory/3716-0-0x00007FFBD72C3000-0x00007FFBD72C5000-memory.dmp

    Filesize

    8KB

  • memory/3716-1-0x00000297041F0000-0x0000029704208000-memory.dmp

    Filesize

    96KB

  • memory/3716-2-0x000002971E840000-0x000002971EA02000-memory.dmp

    Filesize

    1.8MB

  • memory/3716-3-0x00007FFBD72C0000-0x00007FFBD7D82000-memory.dmp

    Filesize

    10.8MB

  • memory/3716-4-0x000002971FCC0000-0x00000297201E8000-memory.dmp

    Filesize

    5.2MB

  • memory/3716-5-0x00007FFBD72C3000-0x00007FFBD72C5000-memory.dmp

    Filesize

    8KB

  • memory/3716-6-0x00007FFBD72C0000-0x00007FFBD7D82000-memory.dmp

    Filesize

    10.8MB

  • memory/3716-26-0x00007FFBD72C0000-0x00007FFBD7D82000-memory.dmp

    Filesize

    10.8MB