Analysis
-
max time kernel
13s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2024 22:15
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/login?redirect_to=%2Foauth2%2Fauthorize%3Fclient_id%3D431247481267814410%26redirect_uri%3Dhttps%253A%252F%252Finvite.gg%252Fsetup%26permissions%3D1%26scope%3Dbot%26response_type%3Dcode%26guild_id%3D810956531843596320
Resource
win10v2004-20240221-en
General
-
Target
https://discord.com/login?redirect_to=%2Foauth2%2Fauthorize%3Fclient_id%3D431247481267814410%26redirect_uri%3Dhttps%253A%252F%252Finvite.gg%252Fsetup%26permissions%3D1%26scope%3Dbot%26response_type%3Dcode%26guild_id%3D810956531843596320
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 discord.com 8 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-910440534-423636034-2318342392-1000\{97BB67DA-E570-4683-B1A3-263A238CBBAC} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 528 msedge.exe 528 msedge.exe 624 msedge.exe 624 msedge.exe 388 msedge.exe 388 msedge.exe 4168 identity_helper.exe 4168 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe 624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 624 wrote to memory of 4708 624 msedge.exe 85 PID 624 wrote to memory of 4708 624 msedge.exe 85 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 3672 624 msedge.exe 87 PID 624 wrote to memory of 528 624 msedge.exe 86 PID 624 wrote to memory of 528 624 msedge.exe 86 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88 PID 624 wrote to memory of 4160 624 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.com/login?redirect_to=%2Foauth2%2Fauthorize%3Fclient_id%3D431247481267814410%26redirect_uri%3Dhttps%253A%252F%252Finvite.gg%252Fsetup%26permissions%3D1%26scope%3Dbot%26response_type%3Dcode%26guild_id%3D8109565318435963201⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9b3a46f8,0x7ffc9b3a4708,0x7ffc9b3a47182⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2624 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,5450061772423892350,4301340188713235347,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:4712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a65ab4f620efd5ba6c5e3cba8713e711
SHA1f79ff4397a980106300bb447ab9cd764af47db08
SHA2563964e81a3b4b582e570836837b90a0539e820886a35281b416e428e9bf25fd76
SHA51290330661b0f38ca44d6bd13a7ea2ab08a4065ec4801695e5e7e0dea154b13ac8d9b2737e36ebe9a314d2501b5ef498d03c5617c87e36986e294c701182db41b9
-
Filesize
152B
MD5854f73d7b3f85bf181d2f2002afd17db
SHA153e5e04c78d1b81b5e6c400ce226e6be25e0dea8
SHA25654c176976e1c56f13af90be9b8b678f17f36a943210a30274be6a777cf9a8dc4
SHA512de14899cfaad4c312804a7fe4dcb3e9221f430088cb8bf5a9b941ac392a0bbad4e6ca974e258e34617bbffff3bf6490fa90d8c6921616f44186e267ddaa02971
-
Filesize
6KB
MD53c62db54907fd0aed805336331e526a3
SHA19d31e1b71bb3c19dde90988d699a230bf2bdad04
SHA256f23d4a010aea46bfe7d32251da18ed7ba58874457b7c47511da913cf43d81635
SHA51264d567944e2933cbfe3820a9288764e0eedfb1aeba16c4309686ab00b632193a5ebd618adf38c17e9afd57e821148d8a6d9329dfe33387a8bdfb7d03743d891f
-
Filesize
6KB
MD574465ef1ae33f0931a8ec70dcaefcfd6
SHA16f4d869041f01c892e023c257c061f64a64920fb
SHA2568fc952604c52ed5ae4bcf99308e168c66eb8ad203af81ade7168fe9765608c3f
SHA51238eb0481efe57ca9d95bf2444f52771e5e3efc50a2baa7384134fc73b737af49952f38e4d42069ee6dafd3f3377988ffad13d3e30efb9cead6ef70639d28f11d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e44814812df78e68b98e8cb698709c85
SHA145b770b9d964de5a35447bc251e48ade78cd6b59
SHA25623c2e7082f3018849b97040149860b8b1e7eb269a640e03386934e7f51e71c2c
SHA51271d051cd6381ceafff1e6c0c42bc939c2ca731b0c3e3dd4c38ed4762e9b167410dd2ce3ed1d5107caaa96a6257ea0c34ef651599af76ee957ff8410d30ce5750