Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-09-2024 03:43
Static task
static1
Behavioral task
behavioral1
Sample
BfIgOz7.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
BfIgOz7.exe
Resource
win11-20240802-en
General
-
Target
BfIgOz7.exe
-
Size
6.8MB
-
MD5
29daf7a58aacdc2459d9145039474754
-
SHA1
df7807760855e648920c85c29b12e2e817930729
-
SHA256
73ffdb5bc29185f6c68ea22d571859218635a17bad466d4c5aee1b4a3421dfb1
-
SHA512
e1db029d471eede7cfcecf5428b8d7669c4655b5d4a7c854fd952894c9e5d3c0497cd741235a9c312cc08c8fb811f051d1756264b585ec4e0f98a982d65f803e
-
SSDEEP
98304:o1kTd/1SqRWF/A0E/CoSMWjILQjMhAjUc7DL5s:WkTd7RWF/I/ZWjsjajUc72
Malware Config
Extracted
discordrat
-
discord_token
MTI4NDY3NDQ5OTc5ODc2NTczOA.GRsRSd.UW5uwQ1usFhHH7EewkpyCqw589sAshmfAmxuZg
-
server_id
1284674413421133905
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3184 powershell.exe 1880 powershell.exe 1720 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2304 roblox.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 1 discord.com 4 discord.com 6 discord.com 8 discord.com 9 discord.com -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 1632 cmd.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3184 powershell.exe 3184 powershell.exe 1720 powershell.exe 1720 powershell.exe 1880 powershell.exe 1880 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3184 powershell.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 1880 powershell.exe Token: SeDebugPrivilege 2304 roblox.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3184 1988 BfIgOz7.exe 79 PID 1988 wrote to memory of 3184 1988 BfIgOz7.exe 79 PID 1988 wrote to memory of 1720 1988 BfIgOz7.exe 80 PID 1988 wrote to memory of 1720 1988 BfIgOz7.exe 80 PID 1720 wrote to memory of 1632 1720 powershell.exe 81 PID 1720 wrote to memory of 1632 1720 powershell.exe 81 PID 1632 wrote to memory of 1880 1632 cmd.exe 83 PID 1632 wrote to memory of 1880 1632 cmd.exe 83 PID 1880 wrote to memory of 2304 1880 powershell.exe 84 PID 1880 wrote to memory of 2304 1880 powershell.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\BfIgOz7.exe"C:\Users\Admin\AppData\Local\Temp\BfIgOz7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c powershell Add-MpPreference -ExclusionPath 'C:\'' -Verb runAs"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -ArgumentList '/c powershell Start-Process roblox.exe -Verb runAs' -Verb runAs"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c powershell Start-Process roblox.exe -Verb runAs3⤵
- Access Token Manipulation: Create Process with Token
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process roblox.exe -Verb runAs4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\roblox.exe"C:\Users\Admin\AppData\Local\Temp\roblox.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD588dc70c361a22feac57b031dd9c1f02f
SHA1a9b4732260c2a323750022a73480f229ce25d46d
SHA25643244c0820ec5074e654ecd149fa744f51b2c1522e90285567713dae64b62f59
SHA51219c0532741ebc9751390e6c5ca593a81493652f25c74c8cab29a8b5b1f1efef8d511254a04f50b0c4a20724bae10d96d52af7a76b0c85ddc5f020d4cac41100c
-
Filesize
1KB
MD57332074ae2b01262736b6fbd9e100dac
SHA122f992165065107cc9417fa4117240d84414a13c
SHA256baea84fda6c1f13090b8cbd91c920848946f10ce155ef31a1df4cd453ee7e4aa
SHA5124ae6f0e012c31ac1fc2ff4a8877ce2b4667c45b6e651de798318a39a2b6fd39a6f72dffa8b0b89b7a045a27d724d195656faa25a9fec79b22f37ddebb5d22da2
-
Filesize
64B
MD596138a0db9ab71791c2428789806e857
SHA171d70d39ff15b76677a20943332b86be0deff081
SHA2560a9f90944d1e399e13a09af9adf2886f541a2e83c7441c4f3b6f57a25da95903
SHA5125750b72e0ed5b8abd898d686a6ea2eaef2179b0fa09835373182618257de7770b162633c26b4aa7b86c412933b36281eecc822e200b6f4ebb1b0d0106028d71c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
90KB
MD5c7bbc27d3f6c8f80047184a0dd5423c2
SHA19f0600f25fc175508dffe189bae5d0bdb6fcce10
SHA2568456684a9df4033f3199029c67246c264bccdd12a6e5d720521aff7f0ca59364
SHA512413d2d7be16560b37a2df6aa438dfc3f57544c656a9965ffa3d0ccc2b799e9b14f0d36e106e577bd22157f96b6f450e2640a2ecb5e1a6175532ea431ed8ba80b