Analysis
-
max time kernel
7s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 17:26
Behavioral task
behavioral1
Sample
Discord.exe
Resource
win10v2004-20241007-en
General
-
Target
Discord.exe
-
Size
1.1MB
-
MD5
ec88bc94b1144c2c56d0a2d629856c05
-
SHA1
41abf0acfdd3e70bbd34e808ef576e3a8ca7351a
-
SHA256
fcf21eb97245661c8cb307a80f499c78b427b930c4c39066a9ab4113ab17ce07
-
SHA512
ce0639f732e4c17224be5a656164e0e04ab05a07578893ff92b3d9d487970d710c936a0c3d72efe6869e8783cd53b433bcdff9e24dace514940b0417f5e0697b
-
SSDEEP
12288:aRZ+IoG/n9IQxW3OBsee2X+t4RbBFRqNIHxWl1WQVbIkdtYKMX9PxMhq/pJfnQ5x:U2G/nvxW3Ww0tBR81WFKMXlpJxmRYe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Discord.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Discord.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Discord.exeWScript.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
Processes:
Discord.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings Discord.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Discord.exedescription pid Process procid_target PID 3972 wrote to memory of 1180 3972 Discord.exe 82 PID 3972 wrote to memory of 1180 3972 Discord.exe 82 PID 3972 wrote to memory of 1180 3972 Discord.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Discord.exe"C:\Users\Admin\AppData\Local\Temp\Discord.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Chrome\9gF866gX.vbe"2⤵
- System Location Discovery: System Language Discovery
PID:1180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219B
MD56efb47109d1485e1b27493aee6f3384d
SHA168c95e99965433916c008fd64f33ddb10c0e9b2c
SHA2569796ee42ab68884385418febb48d0268e717c40c0b095df89b991c1ee5974f40
SHA5124827993024bb3e0406b55098180b94239bc098182c12991f541cec3d8e512870eb0407671f7dbc28f5d36d0a55a48e673618efc1b2196b8547f6d5e7b38f4dd9