Analysis

  • max time kernel
    84s
  • max time network
    86s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2024 07:15

Errors

Reason
Machine shutdown

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    a2052e280d6b2264a39993ca90f17e09

  • SHA1

    1808a7f26398e9ace8eb0d24e55f74d12fddcb17

  • SHA256

    125991883c09e76a82f840157e6bcfd58cdd718bdd01bbaf531acdace12e3348

  • SHA512

    78edd470591539359c02379a548c3033d170754d0409cb2c0ef8384a4990acc38340803b8aa02f61e0236fded29b9e90b97ade50dd24a6127cde9eac4ad31952

  • SSDEEP

    1536:m2WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+adPIJ:mZv5PDwbjNrmAE+aNIJ

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMxMzcwMDczOTYxMjI4MzAzMw.Gn6kev.CpIcy49lJA4tzFAIjRGqjvuyWkXZ-9nvb98ZTo

  • server_id

    1313700819312443432

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Windows\System32\shutdown.exe
      "C:\Windows\System32\shutdown.exe" /s /t 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2204
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa39b9055 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:1676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4948-0-0x00007FFB52293000-0x00007FFB52295000-memory.dmp

    Filesize

    8KB

  • memory/4948-1-0x0000029502CB0000-0x0000029502CC8000-memory.dmp

    Filesize

    96KB

  • memory/4948-2-0x000002951D350000-0x000002951D512000-memory.dmp

    Filesize

    1.8MB

  • memory/4948-3-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

    Filesize

    10.8MB

  • memory/4948-4-0x000002951DB50000-0x000002951E078000-memory.dmp

    Filesize

    5.2MB

  • memory/4948-5-0x00007FFB52293000-0x00007FFB52295000-memory.dmp

    Filesize

    8KB

  • memory/4948-6-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

    Filesize

    10.8MB

  • memory/4948-7-0x00007FFB52290000-0x00007FFB52D51000-memory.dmp

    Filesize

    10.8MB