Analysis
-
max time kernel
235s -
max time network
225s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-10-2024 12:54
Behavioral task
behavioral1
Sample
ezyzip.zip
Resource
win10-20240404-en
General
-
Target
ezyzip.zip
-
Size
444KB
-
MD5
97d6d15d4a781914c9f43aea5a1dec81
-
SHA1
da259b67f2ab08a096d905f3eccf1d329d38d958
-
SHA256
9905bca893c593653c9e0ce81d7c3210e72e2ff0aa4ee8add2acb8b232588d2c
-
SHA512
25720508072b8f3d31a9f40cd950c35c3a284a7bf30d82f75256b6c7f597b78d5ec5d8fb378733b327c9f01007ff4deea2aaa80888cac17ddc3e7a54bc2eec27
-
SSDEEP
12288:4ThcCVRKuZih6p8mbIhq/6mwI6rim6CaStHub+wZKUGJ6PaS:4ThcCVR1Zihgk3mwrtHxiCYPaS
Malware Config
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 9 IoCs
pid Process 4920 builder.exe 2624 test.exe 5116 test.exe 1996 test.exe 4108 Discord rat.exe 4540 builder.exe 2364 Client-built.exe 4812 Client-built.exe 2900 Client-built.exe -
Loads dropped DLL 4 IoCs
pid Process 4920 builder.exe 4920 builder.exe 4540 builder.exe 4540 builder.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1580 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 1580 7zFM.exe Token: 35 1580 7zFM.exe Token: SeSecurityPrivilege 1580 7zFM.exe Token: SeDebugPrivilege 2624 test.exe Token: SeDebugPrivilege 5116 test.exe Token: SeDebugPrivilege 1996 test.exe Token: SeDebugPrivilege 4108 Discord rat.exe Token: SeDebugPrivilege 2364 Client-built.exe Token: SeDebugPrivilege 4812 Client-built.exe Token: SeDebugPrivilege 2900 Client-built.exe Token: SeDebugPrivilege 3592 taskmgr.exe Token: SeSystemProfilePrivilege 3592 taskmgr.exe Token: SeCreateGlobalPrivilege 3592 taskmgr.exe Token: 33 3592 taskmgr.exe Token: SeIncBasePriorityPrivilege 3592 taskmgr.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
pid Process 1580 7zFM.exe 1580 7zFM.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe -
Suspicious use of SendNotifyMessage 37 IoCs
pid Process 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe 3592 taskmgr.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\ezyzip.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1580
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:424
-
C:\Users\Admin\Desktop\test\builder.exe"C:\Users\Admin\Desktop\test\builder.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4920
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\test\Nyt tekstdokument.txt1⤵PID:3520
-
C:\Users\Admin\Desktop\test\test.exe"C:\Users\Admin\Desktop\test\test.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
C:\Users\Admin\Desktop\test\test.exe"C:\Users\Admin\Desktop\test\test.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
C:\Users\Admin\Desktop\test\test.exe"C:\Users\Admin\Desktop\test\test.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
C:\Users\Admin\Desktop\test\Release\Discord rat.exe"C:\Users\Admin\Desktop\test\Release\Discord rat.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
C:\Users\Admin\Desktop\test\builder.exe"C:\Users\Admin\Desktop\test\builder.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4540
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\test\Nyt tekstdokument.txt1⤵PID:4948
-
C:\Users\Admin\Desktop\test\Client-built.exe"C:\Users\Admin\Desktop\test\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
C:\Users\Admin\Desktop\test\Client-built.exe"C:\Users\Admin\Desktop\test\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
C:\Users\Admin\Desktop\test\Client-built.exe"C:\Users\Admin\Desktop\test\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59e7845217df4a635ec4341c3d52ed685
SHA1d65cb39d37392975b038ce503a585adadb805da5
SHA256d60e596ed3d5c13dc9f1660e6d870d99487e1383891437645c4562a9ecaa8c9b
SHA512307c3b4d4f2655bdeb177e7b9c981ca27513618903f02c120caa755c9da5a8dd03ebab660b56108a680720a97c1e9596692490aede18cc4bd77b9fc3d8e68aa1
-
Filesize
97B
MD58bf82f73efd82977a153b2049c305288
SHA18d7f55d2ba7cff6b7e2b29199bfaab7b52bd8f78
SHA256c0923b1f91298bc33b6a30029a606a9e8fb2c93c3d01faf08c0d986861cb75b6
SHA512c5921a83a857fdccd5a583e2e3b60d126f4f14cf93bd7891d0663249356031b961bb6afebcf8866b3a21bcd368b29e05bb807d641052cb1794ab6624a5ce181c
-
Filesize
79KB
MD5d13905e018eb965ded2e28ba0ab257b5
SHA16d7fe69566fddc69b33d698591c9a2c70d834858
SHA2562bd631c6665656673a923c13359b0dc211debc05b2885127e26b0dce808e2dec
SHA512b95bfdebef33ac72b6c21cdf0abb4961222b7efd17267cd7236e731dd0b6105ece28e784a95455f1ffc8a6dd1d580a467b07b3bd8cb2fb19e2111f1a864c97cb
-
Filesize
10KB
MD54f04f0e1ff050abf6f1696be1e8bb039
SHA1bebf3088fff4595bfb53aea6af11741946bbd9ce
SHA256ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
SHA51294713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12
-
Filesize
1.1MB
MD5508ccde8bc7003696f32af7054ca3d97
SHA11f6a0303c5ae5dc95853ec92fd8b979683c3f356
SHA2564758c7c39522e17bf93b3993ada4a1f7dd42bb63331bac0dcd729885e1ba062a
SHA51292a59a2e1f6bf0ce512d21cf4148fe027b3a98ed6da46925169a4d0d9835a7a4b1374ba0be84e576d9a8d4e45cb9c2336e1f5bd1ea53e39f0d8553db264e746d
-
Filesize
78KB
MD510b0f9d5cdafe05d8860304d0023729a
SHA1823e3ae8bd7170cbaeb09a6d20b9e0beb83f2a9d
SHA256fd1d504d3fc79da2c31d2238d3ad69050e34bcc3126972ee1adad881ee69f3dc
SHA512df32a0adebbcccdd062cee34fecf370a1cb830fd6f2525c755ecba02f6ea0bd611183d26ea9a7e10af9efad4811232d0ac6c53d7693fd0cff7b9ee3ec26dd71d