Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-09-2024 11:46
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win11-20240802-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
871ec39c515d1e6f6594696404868c50
-
SHA1
b93d20a7e926b1396be5ba887ae72cdc28cdc101
-
SHA256
37f79ef934775e7dbcd006be8c438435ffdd059ef4674cee8b988835f5ad2ae9
-
SHA512
bec7154db76b64ec6ef02164e6959664299ed54fa85d74d7a010d21f2e43e9bcf3b16f9c9fea4c8798325e5e0978d66803014e64342ffbac0cbc2745f7e399ea
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+M/PIC:5Zv5PDwbjNrmAE+MIC
Malware Config
Extracted
discordrat
-
discord_token
MTI4MTE5OTI3Mzg3NDI5Njg2Mg.Go_Acr.HUIHPEQaWjoIWxj4Geox9QLBiEggb5zNfnhqSk
-
server_id
1276135122353131575
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3784 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 Client-built.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE 3784 EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\StartConnect.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359B
MD50634d72a9ac8bca360bac96972bcae07
SHA176cc2d5a20491fb9d0446421600659247838c258
SHA256f655a088793468499edb1d2f7c416b3d78cf98ff96e539075498ddf004ddef5d
SHA512203c3acd6029899059b97858c297feb25e763102c2a8d5cfa8fe3582a83b09e6424c6c7906bda6f99dd463e5a3709300edfa1066c79c2de3a27b9b2ccbc8ef84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ed5d2c826ababe5fb0f946470b3b41a1
SHA1e975d54f6f28a2f206cb36d6d45b271a3bbfef0c
SHA2568d6150c02c75eb732a28ee801fb7cb9142f2e28833de35eb0f085b18d09d938d
SHA5122e79d366fff9b5ce92e1effea2319801bed35359a878d589e3c7e57989b3503fbd0a12b76789659395150b795c2983423391826e8fd01e97ca8496bfa78937aa
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD514f544fef6e9f94d91183638cd8b5947
SHA1cbe608398f4ab74f119e167edc6a3929858dd4f9
SHA2567297cd3850d8d8bd4e08d370c491c16dd07c96ee0bc775ff4a3bdda4e6173206
SHA5120e543a1d9ce724d17f887e1c60327b7f3f283650bbea9e7bcf32e1ab4c34a5f5b9def1310915bc8ba6fb7991822e3434c6359b3190e42e00bcac9fc845b1f2c7