General
-
Target
https://filetransfer.io/data-package/n0Wqebxu#link
-
Sample
241007-ch6dsstbkd
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://filetransfer.io/data-package/n0Wqebxu#link
Resource
win10v2004-20240802-en
Malware Config
Extracted
discordrat
-
discord_token
MTIxMzU4NDcwMzAxNDA0MzczOA.G5gvU3.iXtPKXjmWkHoW5yr2PNn40t0ft_Fzq8gjWiFNI
-
server_id
1287154116333666328
Targets
-
-
Target
https://filetransfer.io/data-package/n0Wqebxu#link
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Abuse Elevation Control Mechanism: Bypass User Account Control
UAC Bypass Attempt via SilentCleanup Task.
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1