Overview
overview
10Static
static
3Project Ligma.exe
windows7-x64
1Project Ligma.exe
windows10-2004-x64
10bin/Xeno.dll
windows7-x64
1bin/Xeno.dll
windows10-2004-x64
1bin/libcry...64.dll
windows7-x64
1bin/libcry...64.dll
windows10-2004-x64
1bin/libssl-3-x64.dll
windows7-x64
1bin/libssl-3-x64.dll
windows10-2004-x64
1bin/xxhash.dll
windows7-x64
1bin/xxhash.dll
windows10-2004-x64
1bin/zstd.dll
windows7-x64
1bin/zstd.dll
windows10-2004-x64
1cxapis.dll
windows7-x64
1cxapis.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
Project Ligma.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Project Ligma.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
bin/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
bin/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
bin/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
bin/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
bin/libssl-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
bin/libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
bin/xxhash.dll
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
bin/xxhash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
bin/zstd.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
bin/zstd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cxapis.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
cxapis.dll
Resource
win10v2004-20241007-en
General
-
Target
Project Ligma.exe
-
Size
25KB
-
MD5
4b905d058730d8f822acb3c5403025b3
-
SHA1
8d42b34ac05c33a2785ce4294a23cff4c3b1c735
-
SHA256
56e006657d3057aa8853ae37f16bd07dd9467344190fabf6f809ae1c6bde56a0
-
SHA512
4d31828f8684d6492a501bf8205994db394de77ea0516720aa703a5968095e358b226b23060ae0243771867df01c71800697fdb610bf8c6620657757c54646aa
-
SSDEEP
384:BDzUkIdjc9kyecBWZNgTEp3trMrsNleNf88uuagE9WRPagdF9dofRmVukvwKwq6V:BVeiSv9Nlsf88uycYLd3dAcjq
Malware Config
Extracted
discordrat
-
discord_token
MTMxMjYwNjY0NDYwOTM1NTg2Nw.GmiBbD.BxOkmi6_jSm3KiEBfaoI7z9GP_TE4zxloC3fjo
-
server_id
1312606556201681018
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Project Ligma.exe -
Executes dropped EXE 1 IoCs
pid Process 1068 Client-built.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 62 discord.com 7 raw.githubusercontent.com 8 raw.githubusercontent.com 24 discord.com 25 discord.com 56 discord.com 57 discord.com 61 discord.com 69 raw.githubusercontent.com 70 discord.com 14 raw.githubusercontent.com 28 discord.com 71 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe 832 Project Ligma.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 832 Project Ligma.exe Token: SeDebugPrivilege 1068 Client-built.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 832 Project Ligma.exe 832 Project Ligma.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 832 Project Ligma.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 832 wrote to memory of 1068 832 Project Ligma.exe 83 PID 832 wrote to memory of 1068 832 Project Ligma.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\Project Ligma.exe"C:\Users\Admin\AppData\Local\Temp\Project Ligma.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5047501531983682c470ca7560077477a
SHA199d90e9b66320b9c08e9633607f15743f7d4af7c
SHA256b3bf1cabe7e98e7120e69d3d5c63cea55dd9345aa9facae7a97a84134eaf1984
SHA51247e76b0d14c5d2f601b087413bfa9ba6a00ea11a9ec6666e4787c926b0a2df92da313ed4fe6736913d623de21683ea876006eb43d75a10cd5902be6a2b662bab