Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1799s -
max time network
1687s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/05/2024, 02:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0
Resource
win11-20240426-en
General
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133597814443257357" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2994005945-4089876968-1367784197-1000_Classes\Local Settings chrome.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\release.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 1132 chrome.exe 1132 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 3640 4852 chrome.exe 80 PID 4852 wrote to memory of 3640 4852 chrome.exe 80 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 900 4852 chrome.exe 81 PID 4852 wrote to memory of 2960 4852 chrome.exe 82 PID 4852 wrote to memory of 2960 4852 chrome.exe 82 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83 PID 4852 wrote to memory of 4876 4852 chrome.exe 83
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/moom825/Discord-RAT-2.0/releases/tag/2.01⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe1159ab58,0x7ffe1159ab68,0x7ffe1159ab782⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:22⤵PID:900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2040 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:82⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2112 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:82⤵PID:4876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3004 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3012 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:12⤵PID:3900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4476 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:82⤵PID:2740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:82⤵PID:2684
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4876 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:82⤵
- NTFS ADS
PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5096 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 --field-trial-handle=1776,i,6972773385144582010,10759877988977112118,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:3356
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b0588d2af54b65a83dd611be1133e37f
SHA17252aeeb877cbd4206fe27113396398454e530a5
SHA256718b387178d9942965bb0c20e549b601a93b8cce8078815757cc16877fdee801
SHA51254b44e8b0d3f6d05ba32dd485570b428ff5dc171f32ba889c875c1a10a892b70b49aab13b4ad24aa2b222b0ea79fb9c312b93c594322b29fe606bd642c68abf3
-
Filesize
2KB
MD58b741943a17787bb5a680d1325c35de9
SHA15b6e34e08501a549bc4259f6794a5dea50368b5e
SHA2568c5204aa98994a5561e47ddc929f7eecb2e71184b11d57c1cf63e2bb00999104
SHA5122e87b149998e94df38d5d5c0a87add8996f4eeddf41ff64e5e974b242494ee8439b990f53e7291b0e3d92aeae4d46281b2caede689d8887df05340249b47685f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5858f9c304cd5373b8c26b514ec84e888
SHA1989d6cca61cd7cae5bc3d1a150d6117219c706ba
SHA2563f920a7d4fb88f5959c905972c0c90546a4b1633464cadb6e0a8f6f7bb3aeabf
SHA512bc91ae461833acde60b1dfe0abd956e67e3553baa72e0fe8ac9cc95605f3b6a18de8592181f3eb271ec8affcbf36de544d501bc6cef47748dd5c39127b5458e9
-
Filesize
7KB
MD5cda77204c7f8309af8c0ec4b61900011
SHA11aafbccb8744efb8ef4cfca9f0f9a4aaea1f43f9
SHA25612be29c456130df417bc9fa06953243487bf19d56126f78cf5254188571e0903
SHA5128556e61b4adc2f6f2658bf31495eb57aa371aea358b51d5011bc3645fa757a6d0106c7f024c3ece24fb70b455379c382766be6dc365dce78b265a7fbe155dc76
-
Filesize
130KB
MD50f981e7ebf2b5be44b094a61bd42ed63
SHA176c5b68314d978be82ad0fd1c09e7130e4390e45
SHA2568b3de974a35c3c91fcab739380c79cd246b01b3837b6e8f27a8d91554a6caf78
SHA5120e6815a207536080aca329e71094fe9ba64ab1f02c4abb0386ec6f890f698c03e3ee8bcedfe416fb458aa6be8980f4d3a1716b7f57e3eaaf9b5687a001336b1e
-
Filesize
94KB
MD59cf8c9de0b0f3f7fb581b40859adcd2b
SHA1234e60eef01111f57c056d3ef1120f15c4acbc5f
SHA2569c91d4088c43329ccfa6018d316694388c886403f6134640d8e822c3ae1b4f0b
SHA51230945815d68a4bf6884453a80a6c84fc557f38ce787a60c070879ca2bc1dbc794e651bc6a7b1375d069189e58eac1e4e6ae3a22a5a618543deda62aa25824fb1
-
Filesize
88KB
MD59a9f2d64fb445e776bf3061242685b5c
SHA16e03cb32515c6754445702edbd34224497edac82
SHA2565abbdf75e497a13d5023cc1b269452df8780f1bf2378a8c6f8040a39f0e3a4bf
SHA5129ec1ea8c062ee14ba3e241c00b5dc6efa9b984c942eb45c071929729362a962dedb1d999e591e61d08bf345205cf46f2a9c42113e6282a6cb8ad0d43f30341ac
-
Filesize
445KB
MD506a4fcd5eb3a39d7f50a0709de9900db
SHA150d089e915f69313a5187569cda4e6dec2d55ca7
SHA256c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
SHA51275e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98