Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 22:05
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
windows7-x64
2 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
4 signatures
1800 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
551a04485f5caf25147b76f5a554bfc1
-
SHA1
c4e5a9ede2c38a7381bd7ef796bb3996eeeef000
-
SHA256
7dd4cf7bd50b349ac8a4d1439587f395e934b2642766d6eb73e2442b177f54e2
-
SHA512
094a3e1eba6beea9fccad0979b0683f9bd569834b9b1b864ca493a232f756982deeaaabc04f09b9eafeb7811c922e2737f3d6bb53f246200bfb950c97d12c31a
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+5QPIC:5Zv5PDwbjNrmAE+mIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI5MjYwNzk0MjkwNjA4NTQzNw.GVi9xR.xH5UnduU--gAZxv8yMJkUJoLgnsi3Qr10kCCec
-
server_id
1286806950083825754
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 10 IoCs
flow ioc 52 discord.com 65 discord.com 43 discord.com 47 discord.com 50 discord.com 51 discord.com 44 discord.com 56 discord.com 57 discord.com 64 discord.com -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4856 Client-built.exe Token: 33 4556 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4556 AUDIODG.EXE Token: SeDebugPrivilege 2212 whoami.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 940 4856 Client-built.exe 92 PID 4856 wrote to memory of 940 4856 Client-built.exe 92 PID 940 wrote to memory of 2212 940 cmd.exe 94 PID 940 wrote to memory of 2212 940 cmd.exe 94 PID 4856 wrote to memory of 3624 4856 Client-built.exe 95 PID 4856 wrote to memory of 3624 4856 Client-built.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C whoami2⤵
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C wininit2⤵PID:3624
-
C:\Windows\system32\wininit.exewininit3⤵PID:2924
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a0 0x49c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4556