File name:

SecuriteInfo.com.Win64.MalwareX-gen.18133.14409

Full analysis: https://app.any.run/tasks/17528763-2a55-4cb7-b823-65baac08d2c3
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: October 19, 2024, 20:38:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discord
exfiltration
stealer
evasion
ims-api
generic
themida
discordrat
Indicators:
MIME: application/x-dosexec
File info: PE32+ executable (GUI) x86-64, for MS Windows
MD5:

36822EF4005B28FD0053970358E11DE4

SHA1:

CC104E16DD60A56F6F3BB95940BADBC2316ABDBC

SHA256:

83E4261B0D42B3E38F27DD81F861C821D4D184320C32C8CB7FC8D35C3D058CDF

SSDEEP:

98304:2nBLpcCTMMG3GEfxU7Pxu7ytit7jOdG9MzvpxZu1hztQPcIe3R84JQttNdeIomgW:OjjgK0ru

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Attempting to use instant messaging service

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Stealers network behavior

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • DISCORDRAT has been detected (YARA)

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
  • SUSPICIOUS

    • Reads the BIOS version

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • The process connected to a server suspected of theft

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Checks for external IP

      • svchost.exe (PID: 2172)
      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Possible usage of Discord/Telegram API has been detected (YARA)

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
  • INFO

    • Checks supported languages

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Reads the computer name

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Reads the machine GUID from the registry

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Disables trace logs

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Reads Environment values

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Checks proxy server information

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Reads the software policy settings

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
    • Attempting to use instant messaging service

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
      • svchost.exe (PID: 2172)
    • Themida protector has been detected

      • SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe (PID: 3648)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic Win/DOS Executable (50)
.exe | DOS Executable Generic (49.9)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2084:03:20 18:56:28+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 48
CodeSize: 100352
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x72a0b0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Discord rat
FileVersion: 1.0.0.0
InternalName: Discord rat.exe
LegalCopyright: Copyright © 2022
LegalTrademarks: -
OriginalFileName: Discord rat.exe
ProductName: Discord rat
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
130
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start THREAT securiteinfo.com.win64.malwarex-gen.18133.14409.exe svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2172C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
3648"C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe" C:\Users\admin\AppData\Local\Temp\SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Discord rat
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\securiteinfo.com.win64.malwarex-gen.18133.14409.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
1 039
Read events
1 025
Write events
14
Delete events
0

Modification events

(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3648) SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\SecuriteInfo_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
60
DNS requests
23
Threats
10

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5488
MoUsoCoreWorker.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5488
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
2776
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7088
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
7088
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
4548
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6944
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
1764
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5488
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5488
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4360
SearchApp.exe
23.15.178.226:443
www.bing.com
Akamai International B.V.
DE
whitelisted
4020
svchost.exe
239.255.255.250:1900
whitelisted
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 4.231.128.59
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
www.bing.com
  • 23.15.178.226
  • 23.15.178.147
  • 23.15.178.200
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
google.com
  • 216.58.212.174
whitelisted
gateway.discord.gg
  • 162.159.136.234
  • 162.159.134.234
  • 162.159.135.234
  • 162.159.133.234
  • 162.159.130.234
whitelisted
discord.com
  • 162.159.137.232
  • 162.159.138.232
  • 162.159.135.232
  • 162.159.128.233
  • 162.159.136.232
whitelisted
geolocation-db.com
  • 159.89.102.253
whitelisted
login.live.com
  • 20.190.159.64
  • 40.126.31.73
  • 40.126.31.67
  • 20.190.159.68
  • 20.190.159.71
  • 20.190.159.0
  • 20.190.159.2
  • 40.126.31.71
whitelisted

Threats

PID
Process
Class
Message
2172
svchost.exe
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
3648
SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2172
svchost.exe
Misc activity
ET INFO External IP Lookup Domain in DNS Lookup (geolocation-db .com)
3648
SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe
Misc activity
ET INFO External IP Lookup Domain (geolocation-db .com) in TLS SNI
3648
SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
3648
SecuriteInfo.com.Win64.MalwareX-gen.18133.14409.exe
Successful Credential Theft Detected
STEALER [ANY.RUN] Attempt to exfiltrate via Discord
Misc activity
ET INFO Observed Discord Domain in DNS Lookup (discord .com)
Misc activity
ET INFO Observed Discord Domain (discord .com in TLS SNI)
2 ETPRO signatures available at the full report
No debug info