Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2025, 21:39
Behavioral task
behavioral1
Sample
Crack perm spoofer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Crack perm spoofer.exe
Resource
win10v2004-20250217-en
General
-
Target
Crack perm spoofer.exe
-
Size
78KB
-
MD5
63ec2a8c348d255586762d693ddf98db
-
SHA1
b04dda431d28d76e205b528f74d10ffa69f3a960
-
SHA256
013fa3b832efcc8647331576e6f512b4101eb087d6155bbfc976d680e668a667
-
SHA512
e1f5f717770212241243f5cc166f7b89f6f89c0cdf2f442b56b8b5738e820a79a513fb9733a78451908c717961273acebc314a99f198cded5b425e878b4fbc88
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+OPIC:5Zv5PDwbjNrmAE+qIC
Malware Config
Extracted
discordrat
-
discord_token
MTMzNDYyNTQ5ODUxMjQ5NDYzNA.G0EGQj.I75TlNTsSnE4gYOgbUK9YInJj34V1hRalj4piM
-
server_id
1185260625232937030
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 512 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3596 Crack perm spoofer.exe Token: SeDebugPrivilege 512 taskmgr.exe Token: SeSystemProfilePrivilege 512 taskmgr.exe Token: SeCreateGlobalPrivilege 512 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe 512 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crack perm spoofer.exe"C:\Users\Admin\AppData\Local\Temp\Crack perm spoofer.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3596
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:512