Resubmissions

19-03-2024 22:20

240319-19cskahh7s 8

19-03-2024 22:13

240319-15j13shg4v 10

Analysis

  • max time kernel
    72s
  • max time network
    103s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    19-03-2024 22:13

General

  • Target

    https://gofile.io/d/No1dZA

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIwMDE5NTE2Mjg5OTQ4ODg2Mw.G5bn_E.uH8gLz-3d0DA2gMRsxpNKRbvApv4LMNEdIrDPI

  • server_id

    1200195224278945802

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 14 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/No1dZA
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffb49573cb8,0x7ffb49573cc8,0x7ffb49573cd8
      2⤵
        PID:4220
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1980 /prefetch:2
        2⤵
          PID:2992
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2832
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:8
          2⤵
            PID:1628
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
            2⤵
              PID:2792
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
              2⤵
                PID:3124
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
                2⤵
                  PID:5052
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4088 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2072
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:1
                  2⤵
                    PID:872
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5620 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2692
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:1
                    2⤵
                      PID:1920
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:1
                      2⤵
                        PID:2536
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5748 /prefetch:8
                        2⤵
                          PID:2908
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5868 /prefetch:8
                          2⤵
                          • NTFS ADS
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2200
                        • C:\Users\Admin\Downloads\nudes.exe
                          "C:\Users\Admin\Downloads\nudes.exe"
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          PID:844
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5960 /prefetch:1
                          2⤵
                            PID:1304
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5812 /prefetch:1
                            2⤵
                              PID:1744
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                              2⤵
                                PID:3652
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,15348590076979239604,15052654315606241106,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:1
                                2⤵
                                  PID:2112
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:4152
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:5060
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
                                    1⤵
                                      PID:232

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      a91469041c09ba8e6c92487f02ca8040

                                      SHA1

                                      7207eded6577ec8dc3962cd5c3b093d194317ea1

                                      SHA256

                                      0fef2b2f8cd3ef7aca4d2480c0a65ed4c2456f7033267aa41df7124061c7d28f

                                      SHA512

                                      b620a381ff679ef45ae7ff8899c59b9e5f1c1a4bdcab1af54af2ea410025ed6bdab9272cc342ac3cb18913bc6f7f8156c95e0e0615219d1981a68922ce34230f

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      601fbcb77ed9464402ad83ed36803fd1

                                      SHA1

                                      9a34f45553356ec48b03c4d2b2aa089b44c6532d

                                      SHA256

                                      09d069799186ae736e216ab7e4ecdd980c6b202121b47636f2d0dd0dd4cc9e15

                                      SHA512

                                      c1cb610c25effb19b1c69ddca07f470e785fd329ad4adda90fbccaec180f1cf0be796e5628a30d0af256f5c3dc81d2331603cf8269f038c33b20dbf788406220

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      288B

                                      MD5

                                      390fb1d36e947b634a8fa75544c90670

                                      SHA1

                                      25af3db8c2c7d975d7cd6253ecfdba749366edef

                                      SHA256

                                      0d306692492aad82c69c92aa7d62a6317dfb90af6679639d8843e54e0489e535

                                      SHA512

                                      63fd519f92d7ce9c26c38fc130968b474fcbf0058b9eca467e1993616e27b3a22bd0d39a911ce00660af99f1021a3eea0b6b5bd5cff368ee133e33749e6b17e7

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      317B

                                      MD5

                                      afc6cddd7e64d81e52b729d09f227107

                                      SHA1

                                      ad0d3740f4b66de83db8862911c07dc91928d2f6

                                      SHA256

                                      b5e81a7c7d80feaaa10ee7bc8aaef9f21a5c1e4b03b3823ed115022311d674a0

                                      SHA512

                                      844edb69585153c378a7c97709983776fc9303a32fb5ef8122ecca32adfc0b265f5ef7118ee07814da5c020ac7ba1bf2a2f66d46312e4d8e6df99aab2e5f9b2a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      c68305659b7186a4c23851fe8734be08

                                      SHA1

                                      38082a6f82159ff5249ee60a1a145e364e8f20cc

                                      SHA256

                                      8e12698f09740307343b72b6e05f039d7132cd96382b629f940411d3af76a56f

                                      SHA512

                                      11f0e5619ce905d3ecb82e0aea1998d839fa9bf66cb66329ef90df73da2a0d06d4d49a22f5309a79ea04bd50651ad2a669b0a624b127c8b9efd064ff8517a90b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      c0aca57f5ebbe2a5ba49e35bab889096

                                      SHA1

                                      9b940815600ebabca3605c426b6eeb8d74093984

                                      SHA256

                                      f8c45049c553c8f0015a4e29018fde628b377553fda5ced688dcee2878b93326

                                      SHA512

                                      15f6d6892dfd001d0b49cb994c78e854635089fe7a66c6133812df288d64ced0134e831ef7d465420126000ba7cede91c62aeee3608d06277770e8d94d256cc4

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      f4c847e9546636dd793e420db10ca3b3

                                      SHA1

                                      99d1c18ed573606a4bdb62b53ef89024373d4c4e

                                      SHA256

                                      40816f00f5fecefa17700e2fc88c3aa5741913886c72537c7c5726f48d701624

                                      SHA512

                                      3bdfe9f9a81efd7eeab52552de0e1bb6843cf6cf1ac0e22927a08b33ad9c9d1e2dd174a611d346424ebe9965d72fc3566acc1deebca46cf85be283ed29c931ed

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      af40cc975ad46ed3d2270cd8bcae1af6

                                      SHA1

                                      97f8763a7c1ec7e1b49409ca1a0223c83a7446d5

                                      SHA256

                                      0bb348ded41e40ab8f218afd7a2dd2b3ff1db86c8ca4a072b0612ca886eda812

                                      SHA512

                                      695dd5110f0019b6df1993d0c6b4523895c8f892882f128e5ca11e04fa3d8905fb02d5a6b11022640d156f19b075df3d5af94b22ab0fdd3978505accc3ce50a6

                                    • C:\Users\Admin\Downloads\Unconfirmed 304790.crdownload

                                      Filesize

                                      78KB

                                      MD5

                                      bdbd6fa439fb4dc1725ad7f834add265

                                      SHA1

                                      ed02a46eb700d976aa2884058f697eb8a4fc09f4

                                      SHA256

                                      870d8d7d4a4abbbf0138e5a063554f73389add79079467fedfc1814e32a57f33

                                      SHA512

                                      1eb43379afa4bb75256a67b453c02f5673fc549c946ef0e176bce21ca0194cff1aae602eda56764abb60a49655d36abdb690848819e14acc968f0505aa75cf1c

                                    • C:\Users\Admin\Downloads\nudes.exe:Zone.Identifier

                                      Filesize

                                      153B

                                      MD5

                                      63da0151ed39ebf81a4916d3c8c75ac3

                                      SHA1

                                      6e5403bdb9e77dfe72074200cd1cfe14be7dc9a1

                                      SHA256

                                      9d479d07f6d8486e11c4b24ad0925b2ad66eeef257dca33e97049cb343fa40aa

                                      SHA512

                                      8f2cebac9f50813238577ce2287e3ec262657ae7a213e8471826e0a5dd6046816aea24fba1640349d33be7018c4d52f45ffd9cc080e168e7720c56bdf1737d8f

                                    • memory/844-103-0x0000018AC51C0000-0x0000018AC56E8000-memory.dmp

                                      Filesize

                                      5.2MB

                                    • memory/844-97-0x0000018AAA210000-0x0000018AAA228000-memory.dmp

                                      Filesize

                                      96KB

                                    • memory/844-98-0x0000018AC48C0000-0x0000018AC4A82000-memory.dmp

                                      Filesize

                                      1.8MB

                                    • memory/844-100-0x0000018AC4C80000-0x0000018AC4C90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/844-152-0x0000018AC4B90000-0x0000018AC4C06000-memory.dmp

                                      Filesize

                                      472KB

                                    • memory/844-153-0x0000018AABFE0000-0x0000018AABFF2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/844-154-0x0000018AAC170000-0x0000018AAC18E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/844-155-0x0000018AABFF0000-0x0000018AABFFE000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/844-156-0x00007FFB35790000-0x00007FFB36252000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/844-157-0x0000018AC4C80000-0x0000018AC4C90000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/844-99-0x00007FFB35790000-0x00007FFB36252000-memory.dmp

                                      Filesize

                                      10.8MB