Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-02-2025 17:08
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Client-built.exe
Resource
win10v2004-20241007-en
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
61cc66d0b245e378647cfe3a56a51814
-
SHA1
b097cfda475efe6f4819b6c2db99caf744632f2f
-
SHA256
7c52f297d8d829076e1607c1b7a7a5e584adef82a01e2520dabe6ca801fb55ed
-
SHA512
422a99ce926f2793bff05837e9a226c937a89f59b221b0f9b346a1e7d32f423d2a3b6d8efe87111164884ef3983b6e50aace751531998c4574ea5b2e96da4b74
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+fPIC:5Zv5PDwbjNrmAE+nIC
Malware Config
Extracted
discordrat
-
discord_token
MTMwODUzODYxNDg0MTM0NDAyMQ.GZlTOB.ShLTCmYqgKpUZGmBxJbpfXARUmaxc_aOPfIYyU
-
server_id
1336013454258995351
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4644 vlc.exe 876 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4644 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1240 Client-built.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe 4644 vlc.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 4644 vlc.exe 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE 876 EXCEL.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3832
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\InitializeRepair.MTS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4644
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\InvokeApprove.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:876
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83B
MD5366480bd727fd4904c29eebce4bd875a
SHA1c1eb162f4461d160d276f56f00609977927ef081
SHA2564f07847824097c98f99d5d732bbc2842c23e676fe2a64f39c5451a0b37b07c20
SHA51206a6ff451ca1509087e386b0ffc206345648c6cd088217ed20074c56ae657e34e6de7be37a347dd70e84992f9cd5b033e327fa34dfab2ad4aaba2c7ab179563e