Analysis
-
max time kernel
269s -
max time network
271s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 19:43
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1221895306933833802/1221907200394530947/Client-built.rar?ex=661448c2&is=6601d3c2&hm=742e59191c8cd438d9f6924dfa9ee35cfa6c17abf842ad49793d52839320cfb4&
Resource
win10v2004-20240226-en
General
-
Target
https://cdn.discordapp.com/attachments/1221895306933833802/1221907200394530947/Client-built.rar?ex=661448c2&is=6601d3c2&hm=742e59191c8cd438d9f6924dfa9ee35cfa6c17abf842ad49793d52839320cfb4&
Malware Config
Extracted
discordrat
-
discord_token
MTIyMTkwNjUwNzI5ODM3NzkzMA.GiWyBe.bMc6EfTRKlt2YGmTuWnfGBRENjujQeWux4PFow
-
server_id
1221895306120265778
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 2 IoCs
pid Process 5796 Client-built.exe 3360 Client-built.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1120 msedge.exe 1120 msedge.exe 3984 msedge.exe 3984 msedge.exe 3572 identity_helper.exe 3572 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5972 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeRestorePrivilege 5704 7zG.exe Token: 35 5704 7zG.exe Token: SeSecurityPrivilege 5704 7zG.exe Token: SeSecurityPrivilege 5704 7zG.exe Token: SeDebugPrivilege 5796 Client-built.exe Token: SeDebugPrivilege 5972 taskmgr.exe Token: SeSystemProfilePrivilege 5972 taskmgr.exe Token: SeCreateGlobalPrivilege 5972 taskmgr.exe Token: SeSecurityPrivilege 5972 taskmgr.exe Token: SeTakeOwnershipPrivilege 5972 taskmgr.exe Token: SeDebugPrivilege 3360 Client-built.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 5704 7zG.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe 5972 taskmgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3984 wrote to memory of 2044 3984 msedge.exe 86 PID 3984 wrote to memory of 2044 3984 msedge.exe 86 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1508 3984 msedge.exe 91 PID 3984 wrote to memory of 1120 3984 msedge.exe 92 PID 3984 wrote to memory of 1120 3984 msedge.exe 92 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93 PID 3984 wrote to memory of 2316 3984 msedge.exe 93
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1221895306933833802/1221907200394530947/Client-built.rar?ex=661448c2&is=6601d3c2&hm=742e59191c8cd438d9f6924dfa9ee35cfa6c17abf842ad49793d52839320cfb4&1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa9b3b46f8,0x7ffa9b3b4708,0x7ffa9b3b47182⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:2316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5328 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3372 /prefetch:82⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4251156131658633697,17164283106898303899,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵PID:2164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:540
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5392
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Client-built\" -spe -an -ai#7zMap21022:86:7zEvent252841⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5704
-
C:\Users\Admin\Downloads\Client-built\Client-built.exe"C:\Users\Admin\Downloads\Client-built\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5796
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5972
-
C:\Users\Admin\Downloads\Client-built\Client-built.exe"C:\Users\Admin\Downloads\Client-built\Client-built.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD547b2c6613360b818825d076d14c051f7
SHA17df7304568313a06540f490bf3305cb89bc03e5c
SHA25647a22bea2e7d0154c59bf5d8790ec68274eb05e9fa6cf0eab0d648121f1a02ac
SHA51208d2366fc1ce87dbe96b9bf997e4c59c9206fcfea47c1f17b01e79aeb0580f25cac5c7349bb453a50775b2743053446653f4129f835f81f4a8547ca392557aac
-
Filesize
152B
MD5e0811105475d528ab174dfdb69f935f3
SHA1dd9689f0f70a07b4e6fb29607e42d2d5faf1f516
SHA256c91388c87878a9e2c530c6096dbdd993b0a26fefe8ad797e0133547225032d6c
SHA5128374a721ea3ff3a1ea70d8a074e5c193dbba27ba7e301f19cea89d648b2378c376e48310c33fe81078cd40b1863daec935e8ac22e8e3878dc3a5bb529d028852
-
Filesize
186B
MD5094ab275342c45551894b7940ae9ad0d
SHA12e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e
SHA256ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3
SHA51219d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d
-
Filesize
6KB
MD53e730433dacaa0bcad4588e747eee1f9
SHA16f1b73d7b762c3a7703e4b827672f0f7abbac282
SHA256776af7e1b54eaf2afafb78bb2d643cdb26d41e4250c5fd7e87e5d6ccfa271ac8
SHA5123a13bb56cbccc1e54b6b32ffa5dbc03b319019ec5e90f3b35f42949d430b08ef45d13a65fcc15e85788bc78d3f3140405ce3f83184248063dbf52164cc32916d
-
Filesize
6KB
MD59d5ecabf3dbbdc3b126534c2381f8355
SHA10411a211ce4692fafe58a06099158681a760b2ab
SHA256aa25a7ef9218857e667a7731b051e21ba509cce567b50016ce0054cbd8e974f0
SHA5125473ad21d6bb240299ac6c238d41f7851e43ac3aa3c23182a94fcf4df7c4da80193d492b0075458647710e4c643448878716663c780ead7b16c62abf8cb8c97a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c7a446daf8cb3b12bbe09c78040e7c2f
SHA1bcc59a8e5a21c1242e6c059a76838dd6699fcc1f
SHA2566954486d6573bb32dbc2b6440e0d9f2460b3ebb54805fc6b2543ede85624cc29
SHA5127bd890d4f07fb8a430f0a8e9c2a5ecbfd9a8671493892c872a7ff38254caff8bf264a4ab3afff6e955cec56ab7d877096802c642a9385f2059c14ca902ddb1b0
-
Filesize
26KB
MD53d78b5ab445d0602ff0c4b47582d91c5
SHA1243402f40286e3146271e7374715f645c0ee5997
SHA2567a02bf428d0d07382a07d436fb38ee07411c8e18336e9e5a1c256d50f47360a7
SHA51227c29e38ffad5ce94ea4a704637db3534c0aee1f5db8f43bba090d270c92b8e34dd11a2396d65e3d58b11820bebed8d590e876f740ea841f04c81392973fce57
-
Filesize
78KB
MD5ba830918448347eda9570448c7551140
SHA1585fb1eb9f0969f11f463888c383dc962f50cbbd
SHA25671ef2f19d4ebb21b8d249b180c8fd7df66f21eb5752c143de3927b42a31a9a3a
SHA512dfaf14f9ee95344d85f4785b08b9b1d77a5564c878c5ca990f14ffc8cc2c3974a7ddc77be6916e564d4cee6cc4f3a7d868b06f3ee39427b1b97108d240b56d9a