Analysis

  • max time kernel
    234s
  • max time network
    262s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2024 19:34

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    0f8802133a842494287129e43a31748c

  • SHA1

    977d409ebece79549366a2fe5b3e37faa55f06d8

  • SHA256

    fef53fda9cbd9310aaba86d8fedc2c17c9ed439f23c2082651589bea2c1ac119

  • SHA512

    028601683284ac93edda0f18b8f9d78e46e7f893dfc4718dffb68d5cfea8fd08100c7d50b26ec3d1858ff9f8a422e88264a88c27bee0dfa1bf169eca3de6e7e5

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+sPIC:5Zv5PDwbjNrmAE+AIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI5MDc1MjcwMDYxODkwMzU4NA.GtQzi2.sC37Pnrmf7d5UzZpI0l8Af_ZbwXxp_qf3pLVLU

  • server_id

    1288285708997361725

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4516
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4148,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4176 /prefetch:8
    1⤵
      PID:644
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RequestConfirm.jpeg" /ForceBootstrapPaint3D
      1⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3656
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
      1⤵
      • Drops file in System32 directory
      PID:3472
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3096
    • C:\Windows\system32\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\RequestConfirm.jpeg"
      1⤵
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1440
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
      1⤵
        PID:2304

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3472-24-0x000001489C0D0000-0x000001489C0D1000-memory.dmp

        Filesize

        4KB

      • memory/3472-20-0x000001489C040000-0x000001489C041000-memory.dmp

        Filesize

        4KB

      • memory/3472-26-0x000001489C0E0000-0x000001489C0E1000-memory.dmp

        Filesize

        4KB

      • memory/3472-25-0x000001489C0E0000-0x000001489C0E1000-memory.dmp

        Filesize

        4KB

      • memory/3472-7-0x0000014893330000-0x0000014893340000-memory.dmp

        Filesize

        64KB

      • memory/3472-23-0x000001489C0D0000-0x000001489C0D1000-memory.dmp

        Filesize

        4KB

      • memory/3472-22-0x000001489C040000-0x000001489C041000-memory.dmp

        Filesize

        4KB

      • memory/3472-11-0x0000014893380000-0x0000014893390000-memory.dmp

        Filesize

        64KB

      • memory/3472-18-0x000001489BFC0000-0x000001489BFC1000-memory.dmp

        Filesize

        4KB

      • memory/4516-4-0x0000018556580000-0x0000018556AA8000-memory.dmp

        Filesize

        5.2MB

      • memory/4516-6-0x00007FFE6A950000-0x00007FFE6B411000-memory.dmp

        Filesize

        10.8MB

      • memory/4516-1-0x000001853B5A0000-0x000001853B5B8000-memory.dmp

        Filesize

        96KB

      • memory/4516-0-0x00007FFE6A953000-0x00007FFE6A955000-memory.dmp

        Filesize

        8KB

      • memory/4516-5-0x00007FFE6A953000-0x00007FFE6A955000-memory.dmp

        Filesize

        8KB

      • memory/4516-3-0x00007FFE6A950000-0x00007FFE6B411000-memory.dmp

        Filesize

        10.8MB

      • memory/4516-2-0x0000018555C40000-0x0000018555E02000-memory.dmp

        Filesize

        1.8MB