Analysis
-
max time kernel
24s -
max time network
24s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2025, 18:43
Behavioral task
behavioral1
Sample
Loader_Eagle.exe
Resource
win10v2004-20241007-en
7 signatures
150 seconds
General
-
Target
Loader_Eagle.exe
-
Size
108KB
-
MD5
d9310bdfd6eb9699ec1f494400e996e6
-
SHA1
b65144e7a07a75d4354b2fda9df60145e63550d4
-
SHA256
02db83dd982ee8eadbb13701342096001fa816abfb807902c1fa5b4b9cd74fae
-
SHA512
6732a94617349af56eb044ddffbb284620e11aee29350df764996c0cfb24641aea6f663cb8db29a833dbf962667e6268d5315a89dc079d8d6a4c4bd7531c439c
-
SSDEEP
1536:g7WjO8XeEXFMZGO5uPwbjNrfxCXhRoKV6+V+XoKV6+1oKV6+WoKV6+ToKV6+DQwl:gMuZGOQwbjNrmAE+Yj0TBwl
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTE5NTg0ODc1MjI0NjgyNTA1Mg.Gj6VFU.xRdBucUILnznx2xwLkxgd1gyYsVG_qQFYNoaAI
-
server_id
1333477427032227951
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4952 Loader_Eagle.exe Token: SeDebugPrivilege 724 taskmgr.exe Token: SeSystemProfilePrivilege 724 taskmgr.exe Token: SeCreateGlobalPrivilege 724 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe 724 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader_Eagle.exe"C:\Users\Admin\AppData\Local\Temp\Loader_Eagle.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:724