Analysis
-
max time kernel
93s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 18:48
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240802-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
a08689d0e211c14402c41e1b1996ec23
-
SHA1
5b99903cc161a9caf4ad14f60e7039e3046d832e
-
SHA256
c89e5697ebaa2b07aa8c36669c48a849d456bd019d9c6f58f3d8cf7686028349
-
SHA512
c6a9f945a78199aee545ff60892fc4c9fdaa0fbbaabd7ecf8c8698043998258f43bd19c168f9c38ed6414f4d57903fd5b7bafca828ab5c60781a3acaa5f24788
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+aPIC:5Zv5PDwbjNrmAE+GIC
Malware Config
Extracted
discordrat
-
discord_token
MTI4ODIwOTMyODE5MjYyMjY0NA.GRPDfL.M5QTPyyamdLktMv0B2se6E5YkcUOoLy3oEZB98
-
server_id
1279828254592602244
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Abuse Elevation Control Mechanism: Bypass User Account Control 1 TTPs 1 IoCs
UAC Bypass Attempt via SilentCleanup Task.
pid Process 3412 SCHTASKS.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 15 IoCs
flow ioc 56 discord.com 57 discord.com 59 discord.com 63 discord.com 18 discord.com 19 discord.com 22 discord.com 61 discord.com 65 raw.githubusercontent.com 66 raw.githubusercontent.com 58 discord.com 68 discord.com 55 discord.com 60 discord.com 69 discord.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4736 Client-built.exe Token: 33 4284 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4284 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3412 4736 Client-built.exe 94 PID 4736 wrote to memory of 3412 4736 Client-built.exe 94 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /run /tn \Microsoft\Windows\DiskCleanup\SilentCleanup /I2⤵
- Abuse Elevation Control Mechanism: Bypass User Account Control
PID:3412
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x514 0x5101⤵
- Suspicious use of AdjustPrivilegeToken
PID:4284