Analysis
-
max time kernel
873s -
max time network
888s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-02-2025 18:04
Behavioral task
behavioral1
Sample
olduimatrix.exe
Resource
win10ltsc2021-20250217-en
8 signatures
900 seconds
General
-
Target
olduimatrix.exe
-
Size
98KB
-
MD5
9117f3f95888ab5de9da24ab2965cc5a
-
SHA1
2df63c9abcf08e58bcc6fd3891cbf1be30ac1d6d
-
SHA256
4828bdac5bb23ffcea7f6c51142e32157ac2ca80620d1e39b3170513e116b05e
-
SHA512
18d02eb4de36d1c670a4eacdbbb269554b212a379013b17f2d990ea594ef1ec57e0b616985bc53f866dab051d5ce2499bea59340fc58f3d906c42082bcae0f36
-
SSDEEP
1536:92WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+DPISWlKKBh0NjD3C+GlEQ:9Zv5PDwbjNrmAE+bISTbDVGaQ
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTM0MjkxNTYzNjA0NDYzMjE4MA.GLuN76.KEi91jZBbiW-Aa2A5gBlUy7tjno2DDMvendvrg
-
server_id
1342915521502384308
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file 2 IoCs
flow pid Process 59 3384 olduimatrix.exe 60 3384 olduimatrix.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 54 IoCs
flow ioc 60 raw.githubusercontent.com 77 discord.com 81 discord.com 82 discord.com 86 discord.com 5 discord.com 13 discord.com 23 discord.com 30 discord.com 41 discord.com 46 discord.com 58 raw.githubusercontent.com 61 discord.com 70 discord.com 72 discord.com 75 discord.com 79 discord.com 87 discord.com 93 discord.com 97 discord.com 9 discord.com 12 discord.com 29 discord.com 83 discord.com 85 discord.com 90 discord.com 94 discord.com 98 discord.com 44 discord.com 47 discord.com 55 discord.com 73 discord.com 76 discord.com 89 discord.com 64 discord.com 92 discord.com 27 discord.com 38 discord.com 39 discord.com 42 discord.com 59 raw.githubusercontent.com 96 discord.com 99 discord.com 6 discord.com 43 discord.com 45 discord.com 62 discord.com 65 discord.com 66 discord.com 67 discord.com 78 discord.com 40 discord.com 56 discord.com 57 discord.com -
Sets desktop wallpaper using registry 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2B37.tmp.png" olduimatrix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp2DB4.tmp.png" olduimatrix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpFC11.tmp.png" olduimatrix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp7E23.tmp.png" olduimatrix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp4099.tmp.png" olduimatrix.exe Set value (str) \REGISTRY\USER\S-1-5-21-1886653772-2813795769-2221171443-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tmp6B03.tmp.png" olduimatrix.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2080 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3384 olduimatrix.exe Token: SeDebugPrivilege 3808 whoami.exe Token: SeShutdownPrivilege 3384 olduimatrix.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3384 wrote to memory of 1600 3384 olduimatrix.exe 85 PID 3384 wrote to memory of 1600 3384 olduimatrix.exe 85 PID 1600 wrote to memory of 3808 1600 cmd.exe 87 PID 1600 wrote to memory of 3808 1600 cmd.exe 87 PID 3384 wrote to memory of 1012 3384 olduimatrix.exe 88 PID 3384 wrote to memory of 1012 3384 olduimatrix.exe 88 PID 1012 wrote to memory of 2080 1012 cmd.exe 90 PID 1012 wrote to memory of 2080 1012 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\olduimatrix.exe"C:\Users\Admin\AppData\Local\Temp\olduimatrix.exe"1⤵
- Downloads MZ/PE file
- Sets desktop wallpaper using registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C whoami2⤵
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32\whoami.exewhoami3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C systeminfo2⤵
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2080
-
-