Analysis
-
max time kernel
296s -
max time network
280s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-11-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
release.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
release.rar
Resource
win11-20241007-en
General
-
Target
release.rar
-
Size
783KB
-
MD5
1f4bdbaaf4a9997b0519dfec1116375c
-
SHA1
5b0d7aca31b38fea1628012eed2d272f452246ee
-
SHA256
06e548f88374459b49acf9269c108040582f602cde52e5f1e1e02ef1b89b4fea
-
SHA512
3497bbfbdfa024e8e8672c85ee1217e1adbce506df04a27058bf1b9e3bcd17fc80a73dd4e4fbfabd06ce97572af3b30fb2ac45e706a87a95ab8b08e0fd1997b3
-
SSDEEP
24576:5opkq75paphGwjhaAFnWt66OncboOILA76Ga1eESXxly3g:ap5WljIAFnWqncboOWGaMgQ
Malware Config
Extracted
discordrat
-
discord_token
MTI5ODI2NDAyNjg1NzM0NTA1Nw.GUZLej.EaO4IOf1dr7yOFnfuhJGaGXi2EiM1tKWokUH1Q
-
server_id
1298249568756174859
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 4 IoCs
pid Process 1372 builder.exe 2304 builder.exe 5552 builder.exe 3084 builder.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 4 discord.com 5 discord.com 7 discord.com 9 discord.com 11 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 6056 7zFM.exe 4048 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 6056 7zFM.exe Token: 35 6056 7zFM.exe Token: SeSecurityPrivilege 6056 7zFM.exe Token: SeDebugPrivilege 1372 builder.exe Token: SeDebugPrivilege 2304 builder.exe Token: SeBackupPrivilege 5176 svchost.exe Token: SeRestorePrivilege 5176 svchost.exe Token: SeSecurityPrivilege 5176 svchost.exe Token: SeTakeOwnershipPrivilege 5176 svchost.exe Token: 35 5176 svchost.exe Token: SeRestorePrivilege 4048 7zFM.exe Token: 35 4048 7zFM.exe Token: SeSecurityPrivilege 4048 7zFM.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 6056 7zFM.exe 6056 7zFM.exe 4048 7zFM.exe 4048 7zFM.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\release.rar"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:6056
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1492
-
C:\Users\Admin\Desktop\release\builder.exe"C:\Users\Admin\Desktop\release\builder.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
C:\Users\Admin\Desktop\release\builder.exe"C:\Users\Admin\Desktop\release\builder.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
C:\Users\Admin\Desktop\release\release\builder.exe"C:\Users\Admin\Desktop\release\release\builder.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5552
-
C:\Users\Admin\Desktop\release\release\builder.exe"C:\Users\Admin\Desktop\release\release\builder.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3084
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k SDRSVC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5176
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Desktop\release\release\builder.exe"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4048
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\.rsrc\version.txt1⤵PID:5592
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c4915f5546d95ffeec60455267cb8491
SHA15ea32fd86aaef190b4ed125d5f956b5b6c2e6e2a
SHA25677804cbabdc25c2a9574a84e4f4c299754b181b785cd0e49f5169dbda4ea1014
SHA51224f7ab8e933f2202af3a5d55c5c04465eb151679f5a0bd8b6f23e2423b4d436374bb3207c1d172615f1d966a22da41b88476511e4441fe5c2b915b53f6c624a4
-
Filesize
1KB
MD5ac45cc773216001c355992d869450b47
SHA11f19c3839b521e1bf1ec7928f32f45234f38ea40
SHA256c9c03abe98c496376975747c9b617f5f6e1b50aec09aa8be31aa24e81254901f
SHA5123d73620a59089bc05d60ae07f0811ddacd1661599eca096cd9927813f86dc9cebac1de221691373601c743250694de43e408a9e607e813fb28260b1509f84574
-
Filesize
1KB
MD5ed5ab270120e66fdc2275668036b1528
SHA1bd37258520f318a47e121c2d7ec63043b78a342f
SHA2567e83e5bf560714709cdd3eac07b363806ab1035dfbbbafe4f4aea650e9ad0d33
SHA5127f4dfe73d0b4cec3ef6986382e0256935bba7e38d2dd1b52b4e3d4b342be4be6b4882bf2ed1762f3f4030f5529e59659458722fa8e085875b396f0484c1cb88b
-
Filesize
78KB
MD5c4a7023d35c75b966fbde8d59fed7e17
SHA1ce7e86b760a2f4163a8330592b7518e5979ce8ee
SHA2566695c3ee0505eec9a12f4ab8e327e50ae48d9f7217c2588310f3cd6745db8403
SHA512946e7fba6d932d7f2b88db6ab9b440c96654a9a0faa239eee118036be9e9c41417f7a286b37ef2545902571e049df12a62f0c231a38d60cc56a5e2e7414ce136
-
Filesize
10KB
MD54f04f0e1ff050abf6f1696be1e8bb039
SHA1bebf3088fff4595bfb53aea6af11741946bbd9ce
SHA256ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
SHA51294713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12
-
Filesize
4KB
MD59553660c1f0a82fe962396421d6778c1
SHA18da1c43f770c9a6aa115b0176a90faed97380ca3
SHA256bd655f32729cb595889b912c142397e8c19195a90636829d400c6d142bca220e
SHA5122a4d54fb0bd82eb5ac01b15f770046dbf1a1cc3f173288808f8ea6404b8935d68eca9523e9f4c8195ef200aa4b88cab5721e772e8cbd8e356a8856ce060e1001