Resubmissions
02-02-2025 02:35
250202-c21mnatkcq 1002-02-2025 02:32
250202-c1ezka1ngt 1002-02-2025 02:21
250202-ctafhasqbl 10Analysis
-
max time kernel
74s -
max time network
75s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2025 02:32
Static task
static1
Behavioral task
behavioral1
Sample
NebulaExecutor.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
NebulaExecutor.rar
Resource
win10v2004-20250129-en
Errors
General
-
Target
NebulaExecutor.rar
-
Size
27KB
-
MD5
f44ba3369f118e9cc2611886494cc3f8
-
SHA1
ecfcbd5f3149762e00298980c79137ee3299be3a
-
SHA256
b6c7009dd8b089a584aeb6ba37fb75c11a415d63512347beece251e69da5c63b
-
SHA512
b31cd82c9c490e5dc0358459e7d81f12e2ba4ca092d71e27d078d740475fc5857e758b1c3e3996e69ee989bcf21e0acde9c6eeaaba6f30c9f1ea1bcb1eb3cac1
-
SSDEEP
768:2/Dgm33+7HbJRN4FnxT+nugwNwlG+sbiVTRsn:1Ou7Hbh4Ftou9zfbmRu
Malware Config
Extracted
discordrat
-
discord_token
MTMzNTM0MTMyNTUxMTU1NzE5MQ.GJnF0Z.22Phw5o1Gt-WE6QFl0-J7NOftNtcUB5FqXmuQE
-
server_id
1334897427899093072
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1412605595-2147700071-3468511006-1000\Control Panel\International\Geo\Nation NebulaExecutor.exe -
Executes dropped EXE 1 IoCs
pid Process 3404 NebulaExecutor.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 36 discord.com 39 discord.com 42 discord.com 43 discord.com 44 discord.com 45 discord.com 50 discord.com 35 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "157" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeRestorePrivilege 2000 7zFM.exe Token: 35 2000 7zFM.exe Token: SeRestorePrivilege 2632 7zG.exe Token: 35 2632 7zG.exe Token: SeSecurityPrivilege 2632 7zG.exe Token: SeSecurityPrivilege 2632 7zG.exe Token: SeDebugPrivilege 3404 NebulaExecutor.exe Token: SeShutdownPrivilege 1004 shutdown.exe Token: SeRemoteShutdownPrivilege 1004 shutdown.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2000 7zFM.exe 2632 7zG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4164 LogonUI.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3404 wrote to memory of 1004 3404 NebulaExecutor.exe 105 PID 3404 wrote to memory of 1004 3404 NebulaExecutor.exe 105
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\NebulaExecutor.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2000
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3208
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\NebulaExecutor\" -spe -an -ai#7zMap28307:108:7zEvent21251⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2632
-
C:\Users\Admin\AppData\Local\Temp\NebulaExecutor\NebulaExecutor.exe"C:\Users\Admin\AppData\Local\Temp\NebulaExecutor\NebulaExecutor.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" /s /t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa38f3855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4164
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD51f7c55917fc1e27a77bcaa3497156e87
SHA181f89045a559a1836a3fac0a36a7f7076c995339
SHA256399b3c64845039ef901bd16539ee97688cc75eba8f9aae39353784dcd0d5f0f7
SHA512381d354b71987339a78acf6d1df8db883b617e8da66ad54179a4f9940cf319d866f602ca09cb409cc95764c5f502dca24b96134e2305aa7feacc124d3ca05f8e