Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 12:51
Behavioral task
behavioral1
Sample
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe
Resource
win10v2004-20241007-en
General
-
Target
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe
-
Size
5.5MB
-
MD5
d2059975e7e6214a8586d92f4683a4d0
-
SHA1
2ea95fcc0451687ba865791b012b222d5f0e4f84
-
SHA256
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35
-
SHA512
6fdc53a04ac1d231ef5058fd8716d380b73502748c18050e7e2b09c868cb4414d6c01ecde76b139d9a65833361ad801b4b0140a918d9790d87ab545f71d6935e
-
SSDEEP
98304:VoQDmkhTTmnkN9+6cYwl91bpPuc7q+UGg4tyYdsZdXyv5:VUkhTSnkN9+63YPuR+SdS5
Malware Config
Extracted
discordrat
-
discord_token
MTI5MzI4OTY2MzUwMjQ4NzY2NA.GyUepa.Dzh8BeXxXLnd2vAlL5vg4HTInJZ7abxOXlOA6Y
-
server_id
1203358956873977896
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe -
Executes dropped EXE 2 IoCs
Processes:
CLIENT-BUILT.EXENINJA HEX C++.EXEpid Process 3276 CLIENT-BUILT.EXE 3136 NINJA HEX C++.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
CLIENT-BUILT.EXEdescription pid Process Token: SeDebugPrivilege 3276 CLIENT-BUILT.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exedescription pid Process procid_target PID 4540 wrote to memory of 3276 4540 2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe 84 PID 4540 wrote to memory of 3276 4540 2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe 84 PID 4540 wrote to memory of 3136 4540 2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe 85 PID 4540 wrote to memory of 3136 4540 2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe"C:\Users\Admin\AppData\Local\Temp\2c39458bab1183c727a97880d8bba6a8d234929c7b12c8d978271a738d8e2b35N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"C:\Users\Admin\AppData\Local\Temp\CLIENT-BUILT.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\NINJA HEX C++.EXE"C:\Users\Admin\AppData\Local\Temp\NINJA HEX C++.EXE"2⤵
- Executes dropped EXE
PID:3136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5ab2b7deb3a2bf36a87da282ab7de3928
SHA1ce9cc0ea4477c24a81ae2d9a80eb2ad2de36120a
SHA256322edbd361bf1ff43125c16cbedf4cb0044c54f00d0d88159d09f5a0b29c9a9c
SHA512fc360fcd9883552eaec66f3b0c5276cb5d2d60544e5b5d4b7d9d8d99f1e1bfe36c7c5558afa7442519b1f97919e563c929f8e17c7fed0523ab8d158c06f196cb
-
Filesize
5.4MB
MD50cddb6bfe9242d630478c1103f9e23bc
SHA1ca6854c406551e88ed995905c9b78f10860bb18c
SHA256efff056b6dcd8269769531209928d8e51e5a9b6f11ecab4019747043d8c9c886
SHA51294185b375dc71a7284e6419373a0d01e30e4071b0ddfae8c59aa4b0dd719b2a57ac5fb251eb419223413954819fee609572a42d9b8fb201469d5f4dbb2e75a7e