Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 12:09

General

  • Target

    AllizSpoofer.exe

  • Size

    78KB

  • MD5

    fce4de2c4e5a0138fc162ce7e73ffdc2

  • SHA1

    732fcd5f024aa5752b2ef3d8f6ddf0f40e93c714

  • SHA256

    43409f8adcbaae22211ffac1ae7075fd02b8e31e6a045fc5ef33c61e8f80d5f3

  • SHA512

    22be75bed543e2541f37890541eb0e8a2ad526c1c5f1dd7c930a13857f23804dbdf4339772a17d5d40e4b8c24f9b6c5df2ecc3587f8f65b58dc8eff4d09ea406

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+2PIC:5Zv5PDwbjNrmAE+yIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4NjYzMjk0Njg1NzY3MjcwNA.GRnd3c.uBOFgmowGMuT8g9W0s-CmrMTXr5VDVgIZ5biXM

  • server_id

    1286626810435731498

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AllizSpoofer.exe
    "C:\Users\Admin\AppData\Local\Temp\AllizSpoofer.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2200
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /7
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2200-1-0x0000025C7B160000-0x0000025C7B178000-memory.dmp

    Filesize

    96KB

  • memory/2200-0-0x00007FFC19373000-0x00007FFC19375000-memory.dmp

    Filesize

    8KB

  • memory/2200-2-0x0000025C7D710000-0x0000025C7D8D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2200-3-0x00007FFC19370000-0x00007FFC19E31000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-4-0x0000025C7DF50000-0x0000025C7E478000-memory.dmp

    Filesize

    5.2MB

  • memory/2200-20-0x0000025C7DA20000-0x0000025C7DCEA000-memory.dmp

    Filesize

    2.8MB

  • memory/2200-19-0x00007FFC19370000-0x00007FFC19E31000-memory.dmp

    Filesize

    10.8MB

  • memory/2200-18-0x00007FFC19373000-0x00007FFC19375000-memory.dmp

    Filesize

    8KB

  • memory/2508-17-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-16-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-15-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-14-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-13-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-12-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-11-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-6-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-7-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB

  • memory/2508-5-0x0000023CBA750000-0x0000023CBA751000-memory.dmp

    Filesize

    4KB