Analysis

  • max time kernel
    279s
  • max time network
    270s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 16:06

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    6de48dc636e876d997534aa3c5a1b368

  • SHA1

    02b08b739531593ac72dd2aa92b75e3466428b11

  • SHA256

    bbaa30ea37df3080078f35ccd41e6e1c3fe66c81d7c80dda3cf5299af988122c

  • SHA512

    23b1cdbfbc45b95e205f43e48028e5943a3a7c7c9960291e16ce34dafcb53e0e679523f30cb739bf8926355d3eb7d817d5b97c1fc722b192d9cac2925cb6380c

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+WwPIC:5Zv5PDwbjNrmAE+W0IC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI4NjcwOTYwMTQwNzg2MDc3Nw.GdbB5d.SstzGRfJxvsS7oS6I1M3fQK9g8R5_he-FnX100

  • server_id

    1286709234360385586

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Abuse Elevation Control Mechanism: Bypass User Account Control 1 TTPs 1 IoCs

    UAC Bypass Attempt via SilentCleanup Task.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SYSTEM32\SCHTASKS.exe
      "SCHTASKS.exe" /create /tn "$77Client-built.exe" /tr "'C:\Users\Admin\AppData\Local\Temp\Client-built.exe'" /sc onlogon /rl HIGHEST
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:3952
    • C:\Windows\SYSTEM32\SCHTASKS.exe
      "SCHTASKS.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I
      2⤵
      • Abuse Elevation Control Mechanism: Bypass User Account Control
      PID:3596
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2744
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2204-0-0x00007FF8924E3000-0x00007FF8924E5000-memory.dmp

      Filesize

      8KB

    • memory/2204-1-0x00000281B44A0000-0x00000281B44B8000-memory.dmp

      Filesize

      96KB

    • memory/2204-2-0x00000281CEB10000-0x00000281CECD2000-memory.dmp

      Filesize

      1.8MB

    • memory/2204-3-0x00007FF8924E0000-0x00007FF892FA1000-memory.dmp

      Filesize

      10.8MB

    • memory/2204-4-0x00000281CF310000-0x00000281CF838000-memory.dmp

      Filesize

      5.2MB

    • memory/2204-5-0x00007FF8924E3000-0x00007FF8924E5000-memory.dmp

      Filesize

      8KB

    • memory/2204-6-0x00007FF8924E0000-0x00007FF892FA1000-memory.dmp

      Filesize

      10.8MB

    • memory/2744-7-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-9-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-8-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-19-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-18-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-17-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-16-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-15-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-14-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB

    • memory/2744-13-0x0000028E5FAD0000-0x0000028E5FAD1000-memory.dmp

      Filesize

      4KB