Analysis
-
max time kernel
37s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
BfIgOz7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
BfIgOz7.exe
Resource
win11-20240802-en
Errors
General
-
Target
BfIgOz7.exe
-
Size
6.8MB
-
MD5
29daf7a58aacdc2459d9145039474754
-
SHA1
df7807760855e648920c85c29b12e2e817930729
-
SHA256
73ffdb5bc29185f6c68ea22d571859218635a17bad466d4c5aee1b4a3421dfb1
-
SHA512
e1db029d471eede7cfcecf5428b8d7669c4655b5d4a7c854fd952894c9e5d3c0497cd741235a9c312cc08c8fb811f051d1756264b585ec4e0f98a982d65f803e
-
SSDEEP
98304:o1kTd/1SqRWF/A0E/CoSMWjILQjMhAjUc7DL5s:WkTd7RWF/I/ZWjsjajUc72
Malware Config
Extracted
discordrat
-
discord_token
MTI4NDY3NDQ5OTc5ODc2NTczOA.GRsRSd.UW5uwQ1usFhHH7EewkpyCqw589sAshmfAmxuZg
-
server_id
1284674413421133905
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1424 powershell.exe 4984 powershell.exe 3212 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4548 roblox.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 25 discord.com 33 discord.com 34 discord.com 19 discord.com 20 discord.com -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 440 cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1424 powershell.exe 1424 powershell.exe 4984 powershell.exe 4984 powershell.exe 3212 powershell.exe 3212 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1424 powershell.exe Token: SeDebugPrivilege 4984 powershell.exe Token: SeDebugPrivilege 3212 powershell.exe Token: SeDebugPrivilege 4548 roblox.exe Token: SeShutdownPrivilege 4548 roblox.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1808 wrote to memory of 1424 1808 BfIgOz7.exe 86 PID 1808 wrote to memory of 1424 1808 BfIgOz7.exe 86 PID 1808 wrote to memory of 4984 1808 BfIgOz7.exe 90 PID 1808 wrote to memory of 4984 1808 BfIgOz7.exe 90 PID 4984 wrote to memory of 440 4984 powershell.exe 91 PID 4984 wrote to memory of 440 4984 powershell.exe 91 PID 440 wrote to memory of 3212 440 cmd.exe 93 PID 440 wrote to memory of 3212 440 cmd.exe 93 PID 3212 wrote to memory of 4548 3212 powershell.exe 94 PID 3212 wrote to memory of 4548 3212 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\BfIgOz7.exe"C:\Users\Admin\AppData\Local\Temp\BfIgOz7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c powershell Add-MpPreference -ExclusionPath 'C:\'' -Verb runAs"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c powershell Start-Process roblox.exe -Verb runAs' -Verb runAs"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c powershell Start-Process roblox.exe -Verb runAs3⤵
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process roblox.exe -Verb runAs4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\roblox.exe"C:\Users\Admin\AppData\Local\Temp\roblox.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56cf293cb4d80be23433eecf74ddb5503
SHA124fe4752df102c2ef492954d6b046cb5512ad408
SHA256b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA5120f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00
-
Filesize
1KB
MD5276798eeb29a49dc6e199768bc9c2e71
SHA15fdc8ccb897ac2df7476fbb07517aca5b7a6205b
SHA256cd0a1056e8f1b6cb5cb328532239d802f4e2aa8f8fcdc0fcb487684bd68e0dcc
SHA5120d34fce64bbefc57d64fa6e03ca886952263d5f24df9c1c4cce6a1e8f5a47a9a21e9820f8d38caa7f7b43a52336ce00b738ea18419aaa7c788b72e04ce19e4f2
-
Filesize
64B
MD5d12962669ba48beb2b60419a082d95a0
SHA14bf0ae0a2cf064013bc040d4e622723bd8b0afc0
SHA2561b91396bdcf8980a38f583b3f35ae16b1597d43828f7b9cfad78dcffe4c1cb79
SHA512641428e839eac84afbb0eae184efd41b1066c39dcfaab41127262bf5adcf03781c3130f33f1526baa915486469e59e35675516d5f95325cace414ba6f7c2ac08
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
90KB
MD5c7bbc27d3f6c8f80047184a0dd5423c2
SHA19f0600f25fc175508dffe189bae5d0bdb6fcce10
SHA2568456684a9df4033f3199029c67246c264bccdd12a6e5d720521aff7f0ca59364
SHA512413d2d7be16560b37a2df6aa438dfc3f57544c656a9965ffa3d0ccc2b799e9b14f0d36e106e577bd22157f96b6f450e2640a2ecb5e1a6175532ea431ed8ba80b