Analysis

  • max time kernel
    592s
  • max time network
    568s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-05-2024 06:06

General

  • Target

    Discord Bot Client.exe

  • Size

    105.6MB

  • MD5

    0ddf9b2cf944f96777827b6dfe86998c

  • SHA1

    eb1d18ef61d7c0b675462ec75552430d09555555

  • SHA256

    85a919986079c9f6be24770e06c635a16ddf1074b546bcfddfc7edc5c044be95

  • SHA512

    80226dc07a924d8f1897bcd3ee843b5a3d398bf209c91dcad0ba98b7f28a5dd3c4e3304bb32551c24a8919625896ba8aab8a58b0bef3f1eb7a6c342d7dbd1616

  • SSDEEP

    1572864:9oz8QqU7JYFFeEGYu4IDuJzzBU3SlzXbfs:Y5Uf9JhU3GTs

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe
      "C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe" --type=gpu-process --field-trial-handle=1604,14308419549104017717,316742881582877522,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1612 /prefetch:2
      2⤵
        PID:3608
      • C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe" --type=utility --field-trial-handle=1604,14308419549104017717,316742881582877522,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=2356 /prefetch:8
        2⤵
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:424
      • C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe" --type=renderer --field-trial-handle=1604,14308419549104017717,316742881582877522,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --lang=en-US --app-path="C:\Users\Admin\AppData\Local\Temp\resources\app.asar" --no-sandbox --no-zygote --context-isolation --background-color=#fff --enable-spellcheck --enable-websql --disable-electron-site-instance-overrides --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2504 /prefetch:1
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1952
      • C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe
        "C:\Users\Admin\AppData\Local\Temp\Discord Bot Client.exe" --type=gpu-process --field-trial-handle=1604,14308419549104017717,316742881582877522,131072 --enable-features=WebComponentsV0Enabled --disable-features=SpareRendererForSitePerProcess --disable-gpu-sandbox --use-gl=disabled --gpu-preferences=MAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAEAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=2440 /prefetch:2
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3084
    • C:\Windows\System32\CompPkgSrv.exe
      C:\Windows\System32\CompPkgSrv.exe -Embedding
      1⤵
        PID:2492

      Network

      MITRE ATT&CK Matrix ATT&CK v13

      Defense Evasion

      Subvert Trust Controls

      1
      T1553

      Install Root Certificate

      1
      T1553.004

      Modify Registry

      1
      T1112

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Discord Bot Client\43a26584-c830-4cd3-b62f-59e8f38b78fa.tmp
        Filesize

        334B

        MD5

        749cbd1afa835647b233be45dde5bfb3

        SHA1

        fc892fc8f70dcdb08a9fb0a544e991663d721719

        SHA256

        1e558fd915c50fbe9f8bac384ce72d2155912855a1d87dcff00f22c7a964c59b

        SHA512

        243580442586e7b4f49f4d7b3e95cae27e57752d405dd18f0c76df54283407b23f30884f4fd545d537fca8227bff1e1af43cc809d199cc7ee2fb12fb031ad4d7

      • C:\Users\Admin\AppData\Roaming\Discord Bot Client\Network Persistent State~RFe586ef1.TMP
        Filesize

        59B

        MD5

        2800881c775077e1c4b6e06bf4676de4

        SHA1

        2873631068c8b3b9495638c865915be822442c8b

        SHA256

        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

        SHA512

        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

      • memory/3608-2-0x00007FFD4BB10000-0x00007FFD4BB11000-memory.dmp
        Filesize

        4KB

      • memory/3608-35-0x000001E05EB80000-0x000001E05EC6A000-memory.dmp
        Filesize

        936KB