Analysis
-
max time kernel
74s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
29-01-2023 17:48
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.upload.ee/files/14882274/888RAT_1.1.1.rar.html
Resource
win10-20220901-en
General
-
Target
https://www.upload.ee/files/14882274/888RAT_1.1.1.rar.html
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/1069311507558584401/MezRUfnne_aTi-N8ydVGpMBnYd-GliWkHS9kfR0wOOsNUqdTZ5VwXzzls-KkIDdU1tOH
Signatures
-
Mercurial Grabber Stealer
Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 888RAT_1.1.1.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 888RAT_1.1.1.exe -
Executes dropped EXE 2 IoCs
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exepid process 4500 888RAT_1.1.1.exe 4636 888RAT_1.1.1.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools 888RAT_1.1.1.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMWare, Inc.\VMWare Tools 888RAT_1.1.1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 888RAT_1.1.1.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 100 ip4.seeip.org 101 ip4.seeip.org 102 ip-api.com 126 ip4.seeip.org -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 888RAT_1.1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 888RAT_1.1.1.exe -
Drops file in Program Files directory 2 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\888RAT_1.1.1\888RAT_1.1.1.exe chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\888RAT_1.1.1\READ.ME.txt chrome.exe -
Checks SCSI registry key(s) 3 TTPs 2 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S 888RAT_1.1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_VMware_&Prod_VMware_Virtual_S 888RAT_1.1.1.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 888RAT_1.1.1.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 888RAT_1.1.1.exe -
Enumerates system info in registry 2 TTPs 11 IoCs
Processes:
chrome.exe888RAT_1.1.1.exe888RAT_1.1.1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemManufacturer 888RAT_1.1.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosInformation 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemProductName 888RAT_1.1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Logical Unit Id 0 888RAT_1.1.1.exe -
Modifies registry class 1 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2368682536-4045190062-1465778271-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid process 4836 chrome.exe 4836 chrome.exe 4796 chrome.exe 4796 chrome.exe 3740 chrome.exe 3740 chrome.exe 4700 chrome.exe 4700 chrome.exe 900 chrome.exe 900 chrome.exe 856 chrome.exe 856 chrome.exe 300 chrome.exe 300 chrome.exe 580 chrome.exe 580 chrome.exe 2372 chrome.exe 2372 chrome.exe 4104 chrome.exe 4104 chrome.exe 4796 chrome.exe 4796 chrome.exe 2248 chrome.exe 2248 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
Processes:
chrome.exepid process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
7zG.exe888RAT_1.1.1.exe888RAT_1.1.1.exedescription pid process Token: SeRestorePrivilege 4892 7zG.exe Token: 35 4892 7zG.exe Token: SeSecurityPrivilege 4892 7zG.exe Token: SeSecurityPrivilege 4892 7zG.exe Token: SeDebugPrivilege 4500 888RAT_1.1.1.exe Token: SeDebugPrivilege 4636 888RAT_1.1.1.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
Processes:
chrome.exe7zG.exepid process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4892 7zG.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe 4796 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4796 wrote to memory of 2852 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 2852 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 1864 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4836 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4836 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe PID 4796 wrote to memory of 4056 4796 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.upload.ee/files/14882274/888RAT_1.1.1.rar.html1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xb0,0xa8,0xd4,0xac,0xd8,0x7ffdd8cd4f50,0x7ffdd8cd4f60,0x7ffdd8cd4f702⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2268 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1644 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2824 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2816 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4052 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5364 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6488 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5288 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5240 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5280 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Drops file in Program Files directory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5852 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2924 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1616,8109459142476359111,3055321902041193697,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=6352 /prefetch:82⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x3281⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\888RAT_1.1.1\" -spe -an -ai#7zMap2092:86:7zEvent87401⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
-
C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exe"C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exe"C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Executes dropped EXE
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Checks SCSI registry key(s)
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Downloads\888RAT_1.1.1.rarFilesize
17KB
MD5fe5230620ebbed7a40f546e29ad14f2e
SHA193f5d43c9009a83f7a7d76d889d3da5b6ce401d4
SHA25689eea96c7107641222bc632bd7bd6530e9d094b3c6d7fc6dce250a123aa4e724
SHA512251b9952e93f8533d8538dcc88f544a0f7aefce5e704da6073c6a421ced59f1255f8f0cd9b41199024226aaddd9f5920ebe1c82be8e6f0b01cb1242c85215d61
-
C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exeFilesize
41KB
MD54da8b803bc9f0b0466539c4efc08121f
SHA131e756b2c715b9b3bcbd8f08b1cdadd7ae08ea9d
SHA25689361865d8feb602a90e3cb6579cf93f939e34451f765bf4110c4686a9b534f4
SHA51217ee5e1f3c21aa10d86476b478263b31ecde6e40e1d54f2cc7747f2294126fad82229c7a190ec4d897676df0e269757ee1dd92a4c1f65d579cdd9856577220b1
-
C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exeFilesize
41KB
MD54da8b803bc9f0b0466539c4efc08121f
SHA131e756b2c715b9b3bcbd8f08b1cdadd7ae08ea9d
SHA25689361865d8feb602a90e3cb6579cf93f939e34451f765bf4110c4686a9b534f4
SHA51217ee5e1f3c21aa10d86476b478263b31ecde6e40e1d54f2cc7747f2294126fad82229c7a190ec4d897676df0e269757ee1dd92a4c1f65d579cdd9856577220b1
-
C:\Users\Admin\Downloads\888RAT_1.1.1\888RAT_1.1.1.exeFilesize
41KB
MD54da8b803bc9f0b0466539c4efc08121f
SHA131e756b2c715b9b3bcbd8f08b1cdadd7ae08ea9d
SHA25689361865d8feb602a90e3cb6579cf93f939e34451f765bf4110c4686a9b534f4
SHA51217ee5e1f3c21aa10d86476b478263b31ecde6e40e1d54f2cc7747f2294126fad82229c7a190ec4d897676df0e269757ee1dd92a4c1f65d579cdd9856577220b1
-
\??\pipe\crashpad_4796_VCAOASCFYYSDBDEGMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/4500-124-0x0000000000E60000-0x0000000000E70000-memory.dmpFilesize
64KB