Analysis
-
max time kernel
94s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2025 19:08
Behavioral task
behavioral1
Sample
Client-built.exe
Resource
win10v2004-20250217-en
7 signatures
150 seconds
General
-
Target
Client-built.exe
-
Size
78KB
-
MD5
0fc964575cd07a1c00e66c94762402fd
-
SHA1
e026ec9a7119727d8b83d6b6ebf7cd06e0d96731
-
SHA256
90f2dd89dad39a3110f18b1c8591a06eac2875b3f43e0734e6ba73f0f4e3aa14
-
SHA512
fef7c4a0e951504e57ce4fbf56969397522c4e2f02aef2a2b8df52c57cdc3430c72c4e1e018846f747935e398f07169ccbf43f758c8926ebffb1139644092245
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+vPIC:5Zv5PDwbjNrmAE+XIC
Score
10/10
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTM0MzI5MTg0NjcwODY5NTA3MA.G_02fI._RLTy2KgbXmcxr7rvgPp3aA-4GogTzAvo9PiU8
-
server_id
1342636455557861420
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3932 Client-built.exe Token: SeDebugPrivilege 1044 taskmgr.exe Token: SeSystemProfilePrivilege 1044 taskmgr.exe Token: SeCreateGlobalPrivilege 1044 taskmgr.exe Token: 33 1044 taskmgr.exe Token: SeIncBasePriorityPrivilege 1044 taskmgr.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe -
Suspicious use of SendNotifyMessage 33 IoCs
pid Process 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe 1044 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\Client-built.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3932
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1044