Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    02-01-2025 21:16

General

  • Target

    Client-built.exe

  • Size

    78KB

  • MD5

    2e1323e7a1dfbd9c21d945000c5e9cc3

  • SHA1

    03e50ec33bff6f36e874a0cad97acf252efbfa71

  • SHA256

    07f0a68cf4af26e9355c1349bc5c60ae802630faff552081f2785a250ac6284d

  • SHA512

    6c8cffc9bb3773ec05670a00e82e90c31a09b6d023a921db5601f4234ed63eead5d0d740ff79b35bc55aa361ccb59a007ada76fb9ffc4e8d95a9bddec631d1f8

  • SSDEEP

    1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+5PIC:5Zv5PDwbjNrmAE+JIC

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTMwOTg3MTc5NzI4MTM2MTk3Mg.GxkrTq.HMcXJCw7BR5Qd51PElome6meuLewR1-0fLEqpY

  • server_id

    1263224566717878413

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2948
  • C:\Windows\system32\BackgroundTransferHost.exe
    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
    1⤵
    • Modifies registry class
    PID:3040
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:728
    • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
      "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3344

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\9369d663-2126-4e8c-919a-dac443ffe67b.down_data

      Filesize

      555KB

      MD5

      5683c0028832cae4ef93ca39c8ac5029

      SHA1

      248755e4e1db552e0b6f8651b04ca6d1b31a86fb

      SHA256

      855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

      SHA512

      aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

    • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

      Filesize

      10KB

      MD5

      77a8b2c86dd26c214bc11c989789b62d

      SHA1

      8b0f2d9d0ded2d7f9bff8aed6aefd6b3fdd1a499

      SHA256

      e288c02cbba393c9703519e660bf8709331f11978c6d994ea2a1346eef462cb8

      SHA512

      c287e3ae580343c43a5354347ca5444f54840fba127a2b1edc897b1dfea286fa37b5808f6e89f535c4022db8b3f29448aa4cc2f41ab0f308eec525a99fac4e5e

    • memory/2948-0-0x00007FFA50573000-0x00007FFA50575000-memory.dmp

      Filesize

      8KB

    • memory/2948-1-0x000001D0D9510000-0x000001D0D9528000-memory.dmp

      Filesize

      96KB

    • memory/2948-2-0x000001D0F3EF0000-0x000001D0F40B2000-memory.dmp

      Filesize

      1.8MB

    • memory/2948-3-0x00007FFA50570000-0x00007FFA51032000-memory.dmp

      Filesize

      10.8MB

    • memory/2948-4-0x000001D0F5070000-0x000001D0F5598000-memory.dmp

      Filesize

      5.2MB

    • memory/2948-5-0x00007FFA50573000-0x00007FFA50575000-memory.dmp

      Filesize

      8KB

    • memory/2948-6-0x00007FFA50570000-0x00007FFA51032000-memory.dmp

      Filesize

      10.8MB