Analysis
-
max time kernel
124s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 03:15
Behavioral task
behavioral1
Sample
LoaderBasic.exe
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
LoaderBasic.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
9 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
LoaderBasic.exe
-
Size
92KB
-
MD5
46094da1bb8a34bf64fdf689691b2595
-
SHA1
9b95170dd9c718a14e49396a9f8a374e72357220
-
SHA256
cb6d814bf564af56be38a29e93aebd665c29736179462cfb9f9b69f946af8466
-
SHA512
0a1fb7d4d540161501978dde8a141ac899f35e3e8cce0a7a54d712592de9512e86392ed265811f44ecc930a42f17b96cf572d31901cde3646be19cedb99e1657
-
SSDEEP
1536:EbPuJtGN8F+9okEPBAqcBPDyc5I0bpAkAfLgbGNrE9xCIpOMel53:SuJkN8FwokzBBPDyc5RQgbGNrPlt
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTEyODc1NDE4NjI0MzI5NzMwMg.G_xQWE.8Vr08GKNWwCukUxcxGqNOzrKAxZRbWmAMlXKag
-
server_id
1316838123023630386
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 17 IoCs
flow ioc 73 discord.com 74 discord.com 50 discord.com 52 discord.com 28 discord.com 45 discord.com 38 discord.com 63 discord.com 69 discord.com 70 discord.com 71 discord.com 10 discord.com 11 discord.com 57 discord.com 72 discord.com 18 discord.com 56 discord.com -
Sets desktop wallpaper using registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF81B.tmp.png" LoaderBasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp3024.tmp.png" LoaderBasic.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpB0EE.tmp.png" LoaderBasic.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 552 LoaderBasic.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 552 LoaderBasic.exe Token: SeShutdownPrivilege 552 LoaderBasic.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 552 LoaderBasic.exe 552 LoaderBasic.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 552 LoaderBasic.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 552 wrote to memory of 2148 552 LoaderBasic.exe 92 PID 552 wrote to memory of 2148 552 LoaderBasic.exe 92 PID 2148 wrote to memory of 1128 2148 cmd.exe 94 PID 2148 wrote to memory of 1128 2148 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\LoaderBasic.exe"C:\Users\Admin\AppData\Local\Temp\LoaderBasic.exe"1⤵
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C msg * a2⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\system32\msg.exemsg * a3⤵PID:1128
-
-