Analysis
-
max time kernel
1768s -
max time network
1777s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 18:47
Behavioral task
behavioral1
Sample
NixwareCrack.exe
Resource
win7-20240708-en
windows7-x64
3 signatures
1800 seconds
Behavioral task
behavioral2
Sample
NixwareCrack.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
11 signatures
1800 seconds
Errors
Reason
Machine shutdown
General
-
Target
NixwareCrack.exe
-
Size
78KB
-
MD5
376bd2d97cc2ba77cd6da672ba177ed2
-
SHA1
302ac8e952a6e1c6139cbb68bc7e1d1b3a9b3c7c
-
SHA256
e3710ea90501675d0e0115d277cdb1ee5a3ed377d0de81128ccdad5d6c96182f
-
SHA512
d10de99746f1be26c9ee9bc37280f1240e844f185c1f4c5076bcb688bd82af5f61841263d8e5d54f2392a12df42f830458c8106dcd82e4bae204f7a1c1ed5aaf
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+APIC:5Zv5PDwbjNrmAE+kIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTMwMjM1NTczNTkyNTEwMDY3NA.GwroMp.ikOfR8hGBRGsTwLXKnVA4_qSIDO9_Syvc6QRrs
-
server_id
1302358412364873738
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 2232 created 616 2232 NixwareCrack.exe 5 -
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 10 discord.com 23 discord.com 79 discord.com 80 discord.com 84 discord.com 11 discord.com 78 discord.com 82 raw.githubusercontent.com 83 raw.githubusercontent.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 4352 2232 NixwareCrack.exe 124 -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2232 NixwareCrack.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 352 wlrmdr.exe 352 wlrmdr.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 2232 NixwareCrack.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 2232 NixwareCrack.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 2232 NixwareCrack.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 2232 NixwareCrack.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 4352 dllhost.exe 2232 NixwareCrack.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2232 NixwareCrack.exe Token: SeDebugPrivilege 2232 NixwareCrack.exe Token: SeDebugPrivilege 4352 dllhost.exe Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 352 wlrmdr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 2232 wrote to memory of 4352 2232 NixwareCrack.exe 124 PID 4352 wrote to memory of 616 4352 dllhost.exe 5 PID 4352 wrote to memory of 668 4352 dllhost.exe 7 PID 4352 wrote to memory of 956 4352 dllhost.exe 12 PID 4352 wrote to memory of 60 4352 dllhost.exe 13 PID 668 wrote to memory of 2608 668 lsass.exe 45 PID 4352 wrote to memory of 1036 4352 dllhost.exe 16 PID 4352 wrote to memory of 1104 4352 dllhost.exe 17 PID 4352 wrote to memory of 1112 4352 dllhost.exe 18 PID 4352 wrote to memory of 1164 4352 dllhost.exe 19 PID 4352 wrote to memory of 1176 4352 dllhost.exe 20 PID 4352 wrote to memory of 1256 4352 dllhost.exe 21 PID 668 wrote to memory of 2608 668 lsass.exe 45 PID 4352 wrote to memory of 1312 4352 dllhost.exe 22 PID 668 wrote to memory of 2608 668 lsass.exe 45 PID 4352 wrote to memory of 1344 4352 dllhost.exe 23 PID 4352 wrote to memory of 1408 4352 dllhost.exe 24 PID 4352 wrote to memory of 1436 4352 dllhost.exe 25 PID 4352 wrote to memory of 1572 4352 dllhost.exe 26 PID 4352 wrote to memory of 1584 4352 dllhost.exe 27 PID 4352 wrote to memory of 1668 4352 dllhost.exe 28 PID 4352 wrote to memory of 1700 4352 dllhost.exe 29 PID 4352 wrote to memory of 1736 4352 dllhost.exe 30 PID 4352 wrote to memory of 1796 4352 dllhost.exe 31 PID 4352 wrote to memory of 1800 4352 dllhost.exe 32 PID 4352 wrote to memory of 1904 4352 dllhost.exe 33 PID 4352 wrote to memory of 1912 4352 dllhost.exe 34 PID 4352 wrote to memory of 1964 4352 dllhost.exe 35 PID 4352 wrote to memory of 1972 4352 dllhost.exe 36 PID 4352 wrote to memory of 1468 4352 dllhost.exe 37 PID 4352 wrote to memory of 2132 4352 dllhost.exe 39 PID 4352 wrote to memory of 2244 4352 dllhost.exe 40 PID 4352 wrote to memory of 2260 4352 dllhost.exe 41 PID 4352 wrote to memory of 2372 4352 dllhost.exe 42 PID 4352 wrote to memory of 2380 4352 dllhost.exe 43 PID 4352 wrote to memory of 2548 4352 dllhost.exe 44 PID 4352 wrote to memory of 2608 4352 dllhost.exe 45 PID 4352 wrote to memory of 2620 4352 dllhost.exe 46 PID 4352 wrote to memory of 2644 4352 dllhost.exe 47 PID 4352 wrote to memory of 2660 4352 dllhost.exe 48 PID 4352 wrote to memory of 2880 4352 dllhost.exe 49 PID 4352 wrote to memory of 2888 4352 dllhost.exe 50 PID 4352 wrote to memory of 3008 4352 dllhost.exe 51 PID 4352 wrote to memory of 3016 4352 dllhost.exe 52 PID 4352 wrote to memory of 664 4352 dllhost.exe 54 PID 4352 wrote to memory of 3340 4352 dllhost.exe 55 PID 4352 wrote to memory of 3440 4352 dllhost.exe 56 PID 4352 wrote to memory of 3568 4352 dllhost.exe 57 PID 4352 wrote to memory of 3752 4352 dllhost.exe 58 PID 4352 wrote to memory of 3908 4352 dllhost.exe 60 PID 4352 wrote to memory of 4144 4352 dllhost.exe 62 PID 4352 wrote to memory of 1600 4352 dllhost.exe 65 PID 4352 wrote to memory of 3304 4352 dllhost.exe 67 PID 4352 wrote to memory of 4180 4352 dllhost.exe 68
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{8b1d4a94-4e22-431a-94b6-0d4d9fb155aa}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4352
-
-
C:\Windows\system32\wlrmdr.exe-s -1 -f 2 -t Your PC will automatically restart in one minute -m Windows ran into a problem and needs to restart. You should close this message now and save your work. -a 32⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:352
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1036
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1112
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1176
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:3008
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1312
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1436
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2888
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1584
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1700
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1736
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1796
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1904
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1912
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1972
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2244
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2260
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2372
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2380
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2548
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2608
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2620
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2660
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2880
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3016
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3340
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\NixwareCrack.exe"C:\Users\Admin\AppData\Local\Temp\NixwareCrack.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3568
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3752
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3908
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:1600
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵
- Modifies data under HKEY_USERS
PID:4180
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3288
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:1676
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1988
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3808
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3424
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:4576
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:2488