Resubmissions
30-11-2024 03:15
241130-dr675atnek 1030-11-2024 03:14
241130-drmhqatncj 1029-11-2024 21:33
241129-1d7casxlfv 10Analysis
-
max time kernel
19s -
max time network
18s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30-11-2024 03:14
Behavioral task
behavioral1
Sample
242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2N.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2N.exe
-
Size
90KB
-
MD5
0a29b93ea17b31ef5b26a92957cd56d0
-
SHA1
86fb4e69a6af0337d249555361631bae72188310
-
SHA256
242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2
-
SHA512
f19927fa3d574d33b57af1f165c6c231b150b3e237b13f1dbdf65b9880d51635c46fa749182d978d08b32f7d876fb3d55950305c8454104ae37ffcb4cb2d796e
-
SSDEEP
1536:YbPjt72uOFmYskRPUAqtBTldwaIfpAk0Wjgb2NrI+uexCxoKV6+fvjS:WjtyuOFpskpgBTlurRgb2NrI+bSvjS
Malware Config
Extracted
discordrat
-
discord_token
MTMwOTg4MDE2NTE2OTYzMTI1Mw.G_7Dxh.wsYSjBrol4khGDtnY_BBpyEe-H9AsmG2TfF5gs
-
server_id
1309880651683467275
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
taskmgr.exepid Process 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2N.exetaskmgr.exedescription pid Process Token: SeDebugPrivilege 5080 242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2N.exe Token: SeDebugPrivilege 3580 taskmgr.exe Token: SeSystemProfilePrivilege 3580 taskmgr.exe Token: SeCreateGlobalPrivilege 3580 taskmgr.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
taskmgr.exepid Process 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe -
Suspicious use of SendNotifyMessage 28 IoCs
Processes:
taskmgr.exepid Process 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe 3580 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2N.exe"C:\Users\Admin\AppData\Local\Temp\242913144e8c82ed2345b90600f7ae935a484b609371e512501e35f7c7403fe2N.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:5080
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3580