Analysis
-
max time kernel
18s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 21:39
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com/channels/1215995564227952661/1217601208265736223/1240418055256014900
Resource
win10v2004-20240508-en
General
-
Target
https://discord.com/channels/1215995564227952661/1217601208265736223/1240418055256014900
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 10 discord.com 8 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133602827713687299" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1181767204-2009306918-3718769404-1000\{16B19FA9-45AA-49D3-9D86-D8B78A5EEF8A} chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe Token: SeShutdownPrivilege 2900 chrome.exe Token: SeCreatePagefilePrivilege 2900 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe 2900 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 4084 2900 chrome.exe 90 PID 2900 wrote to memory of 4084 2900 chrome.exe 90 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 2836 2900 chrome.exe 91 PID 2900 wrote to memory of 3904 2900 chrome.exe 92 PID 2900 wrote to memory of 3904 2900 chrome.exe 92 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93 PID 2900 wrote to memory of 1160 2900 chrome.exe 93
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://discord.com/channels/1215995564227952661/1217601208265736223/12404180552560149001⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdb251ab58,0x7ffdb251ab68,0x7ffdb251ab782⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1608 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:22⤵PID:2836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2020 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2104 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:82⤵PID:1160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:12⤵PID:3640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3140 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:12⤵PID:1600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=3716 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:12⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4380 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:82⤵PID:3496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4052 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:82⤵
- Modifies registry class
PID:3532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4712 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:82⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3352 --field-trial-handle=2080,i,4201562005968340621,11915179582161326015,131072 /prefetch:82⤵PID:5256
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:4968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3452,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=3456 /prefetch:81⤵PID:4656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD53b0d96ed8113994f3d139088726cfecd
SHA11311abcea5f1922c31ea021c4b681b94aee18b23
SHA256313818d6b177a70fbe715a5142d6221ac1a1851eff5a9f6df505670ddcd73074
SHA5123d78c250029069e1850b1e302a6d8a5154f6e7bc5cd58f449b8824ccf418e80dba2d5569a9cff72f51ccc9de140dc91148f93ec4717f4a880e2ba94898fbdb24
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
690B
MD5bd4b8688c840d85b34b39861aab0b0e8
SHA1274bba1c7bda3e4dc4e3ca55a5bd91a647abb7c6
SHA25697fa32a83554d84da924b153238458e5a11c82470afab80023533dca2bfcf34b
SHA512c03b81c2a3d90e28d0cc0a4dc5effe302ff1a16a5d0ede47bb0f96e6bebb4788282fb2a1cab0c08d841a55a8cef8c2c3b19b51e92810dc0064d24de36c2bb26f
-
Filesize
7KB
MD56266b990712a863a2f3b086605be6773
SHA1a59f511ff6aac59b561c988b3441816708b22390
SHA256c0d6ecf5c83b1bcd20133da3c8c82b4916e96e1844514230887e5c6bab53ca2e
SHA51217022966940e333281ac6949befbe606c782c63f96c9c490e37281285deda6771b3aef9c3fa0036340f6aa48810ed9315751c339676c4b7291b1830e9eb53859
-
Filesize
255KB
MD5382137ca4d3f800464840c0c428fbabe
SHA114b4a4c2a219cd8991eeae9c7aa6197ea7643f1a
SHA256a76ee7a94d0fb1622e86f789c35f670b17730c8e55ef671253148b71e551a234
SHA51274c8418d517a2f04abd4054be13253a9047aace7d8c57121bf3484d00b42915786469ccf5eca1cdba3c16acab4ae8fb8ee5b0ee32386dd24f3174d1434f2b8be