Analysis
-
max time kernel
46s -
max time network
39s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-12-2024 17:09
Behavioral task
behavioral1
Sample
Moon/BootstraperRunmethenopenMoon.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Moon/BootstraperRunmethenopenMoon.exe
-
Size
78KB
-
MD5
be484423fb9da2ded0ce793764f37802
-
SHA1
911dfe225fb915847f497588a201db06e2fd787f
-
SHA256
aff38167e9c702dab38347e95973ae16fa21b23f9bfa5874bf3f9b269e6a4b3a
-
SHA512
a17a457d8d2f2a5bac799e3191c76d14fc955e9d95af2dc938a92b2bb668c97221aa87915c1e9fb65ad557e1cb3e8e41d6e0542b6853f78fb11331f32022746c
-
SSDEEP
1536:NzGsO8XbEXMsLkbvNrfxCXhRoKV6+V+Y15:NqbkbvNrmAE+o5
Malware Config
Extracted
discordrat
-
discord_token
MTMwOTY1NDI0NzE0Njc4MjczMw.GdCiWO.QDjWo8z0Xk0JdOHCguuepaT0RNYGA63CrYGXZo
-
server_id
1280835675205406823
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3200 taskmgr.exe Token: SeSystemProfilePrivilege 3200 taskmgr.exe Token: SeCreateGlobalPrivilege 3200 taskmgr.exe -
Suspicious use of FindShellTrayWindow 47 IoCs
pid Process 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe -
Suspicious use of SendNotifyMessage 47 IoCs
pid Process 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe 3200 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Moon\BootstraperRunmethenopenMoon.exe"C:\Users\Admin\AppData\Local\Temp\Moon\BootstraperRunmethenopenMoon.exe"1⤵PID:4608
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3200