Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    05-06-2024 23:29

General

  • Target

    https://mega.nz/folder/bEMUjBrK#dSqYdVa8Jk8vsVl_um5USw

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0ODAxODg4MTEwMDkxMDYwMw.GRaXlf.ylaGWSJsDFw8FuU8OAZhB6MI1OqGbyePmWUsTg

  • server_id

    1248018097349197876

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 3 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/folder/bEMUjBrK#dSqYdVa8Jk8vsVl_um5USw
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffb75dc9758,0x7ffb75dc9768,0x7ffb75dc9778
      2⤵
        PID:2764
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1596 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:2
        2⤵
          PID:192
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1624 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
          2⤵
            PID:4980
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2076 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
            2⤵
              PID:2780
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2836 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:1
              2⤵
                PID:4476
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2848 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:1
                2⤵
                  PID:3596
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4792 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
                  2⤵
                    PID:3464
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4912 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
                    2⤵
                      PID:2172
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4824 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
                      2⤵
                        PID:516
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
                        2⤵
                          PID:3584
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:8
                          2⤵
                            PID:1412
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2460 --field-trial-handle=1856,i,18424695706845179328,4451235296252934285,131072 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3976
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:3584
                          • C:\Windows\system32\AUDIODG.EXE
                            C:\Windows\system32\AUDIODG.EXE 0x3f8
                            1⤵
                              PID:824
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:3152
                              • C:\Windows\system32\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\release\ae.txt
                                1⤵
                                • Opens file in notepad (likely ransom note)
                                PID:1280
                              • C:\Users\Admin\Desktop\release\builder.exe
                                "C:\Users\Admin\Desktop\release\builder.exe"
                                1⤵
                                • Suspicious use of FindShellTrayWindow
                                PID:4888
                              • C:\Users\Admin\Desktop\release\Client-built.exe
                                "C:\Users\Admin\Desktop\release\Client-built.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:2212
                              • C:\Users\Admin\Desktop\release\Client-built.exe
                                "C:\Users\Admin\Desktop\release\Client-built.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:1088
                              • C:\Users\Admin\Desktop\release\Client-built.exe
                                "C:\Users\Admin\Desktop\release\Client-built.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:4884

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                Filesize

                                72B

                                MD5

                                e969a9703805433a339f1c1b615c7a87

                                SHA1

                                e467517eb8e723bd175d44908824e38ec5c7ccec

                                SHA256

                                a256bea5c874f2d153ea78e0b40f3e4e1da5605b22d5deefee3c67e23290cb8d

                                SHA512

                                af5db3ebbeb0a92ab6330dba0cd07778ae0849183c831cb3be8873d966f4c33100970b2368cc30c3e40a7b964d167e01eb5f90ccc8da31b6fd425136a08f8a56

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\t\Paths\MANIFEST-000001

                                Filesize

                                41B

                                MD5

                                5af87dfd673ba2115e2fcf5cfdb727ab

                                SHA1

                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                SHA256

                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                SHA512

                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\Origins\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                Filesize

                                800B

                                MD5

                                e82a41b215756a3c0b03979f72e57e07

                                SHA1

                                5fad2d0139f3578d8dcd0eeacc5ddd0035090f8e

                                SHA256

                                d366b946573fc31f6faeeed33b1cc044771fd74f82da608ae931ca5242def079

                                SHA512

                                d603e3ec5fe15a9dd77704adedcd9eefc5165261501d59c61881fffb72f264d1c8befb56fa24d48a734b0a14b2bb1a251a8f5734e122f1017db802016ac3187d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                Filesize

                                536B

                                MD5

                                e6b25ead845ff0dcfe9805193f9390cc

                                SHA1

                                25f8b92fc0748b4b47fcab040af5c7395c942046

                                SHA256

                                f3bd1ebbfe0a367593d82b6124e8e42a4edded4cf0a49e20ddf33191499536a5

                                SHA512

                                bfc331a6602f2174ac4684164e691cee594b2089e9a2f7f5a94a227deca5aec43282c1823c0b7ff43ebaa13a8775543e6f1ba83665f552558674a0dc2bb138cd

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                46e82a43071f6083d215875f9ff43075

                                SHA1

                                217adc4988ffcda3315c1caba8f9d35045a646e8

                                SHA256

                                e6177c5b5359a0c02db0e788cb44b0bbd1822231290b86d4b6b2effa37ce949c

                                SHA512

                                25ee546be1704a2e0f4ae3f87d367b624b3921773e90be1c4971ae8496fda0b9be4b44d2e0b7a2ab6eadcf12221bb068ea6a8f93514875fbf1e7f5bb4817e642

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                f7df8b8510a2441d2924bd09884b67ea

                                SHA1

                                f68f440dcd48cc17a285965ef789f66cc6f6b746

                                SHA256

                                519ac1d879055a6858bf101f26acff99ffc0b5aeb0a12e9d28223ec58fb14b93

                                SHA512

                                fd8f4b55f372f6eace798443fc56f7cb400242d135200cc3766470b58c0b07bfde5224f4d3009afb5d67866f7a3f9314e4abecb62d398ca1a24ba5df12efe2d3

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                ce9f51b7f3dc190e787d3e1caf7d221b

                                SHA1

                                7db7bdeb35490495911280de9eb48803f39d9e09

                                SHA256

                                b16758a908f8062fffa2881f73181f46a9e0ecaf12ef3fef06a01818a484361b

                                SHA512

                                1801d913b4ad10a60b32e68ef62d2f4fcd8e41f398556bee93b97b7ca1ea3336471e31bdc420140c8976b5971c5bb5b9fbb35e9f839a359bf90a658323abb66c

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                e28c4ff1531f8f00ab3e1c9ef845ad85

                                SHA1

                                2a68bc319946906d30c358fcc9d749418d29f320

                                SHA256

                                81901a7fc012cb1962245abbc1f2ee69c149b7a51a6330608d7af31715e9ce3d

                                SHA512

                                e2ce2e18e00068e7a9bc8c444271015b87c6eb695b680a769ad12208dc0a29a7097b7303f2b91a10fb113eca70074752cd195dcd9693a2fb5fbed4d764c3b985

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                Filesize

                                72B

                                MD5

                                1e313c8561b5c6da0e9ea75d46bc8ecd

                                SHA1

                                2ac9b2af44faa6dbbd23e4426a1b2e97148a0d33

                                SHA256

                                66f572ad9db2b56c38757c84eb58287cb96baa23f562e68e50f0f6c062f34d14

                                SHA512

                                23f3a575d306cbfbdf775e50790573b5e97fd3a7b0ae093138710ea889256acd9e9d2447145d798a29c0780ef90128811fcaca78313e24c21c07ed5b9598651d

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57c35f.TMP

                                Filesize

                                48B

                                MD5

                                a2d478fd11a587a10b55c13c3d3f476b

                                SHA1

                                1072295cd624393b68329dc5800e92c2e0a29bf5

                                SHA256

                                052c5af6ee13cd16271e36146d3b317ffc72b90875540a159df397677d9c4a11

                                SHA512

                                f2b1e6d49f41ddc2f7f87fa8a6d4a0e80e5582b7889920a02054703d777a6f27e2e44330e061c3c6d7661723f70a14d25d6c22094ee0ab5e7b9ddfd32718b682

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                Filesize

                                136KB

                                MD5

                                e0f2fc97a216179a4bf7cd60fba38dd3

                                SHA1

                                0cf59dee2fe0c1ab48a585eb3d76f0c381eabdb8

                                SHA256

                                46a372ce2b0f769ff93307d274a04ebdae7f0241dce02208c2e9bd82e115027d

                                SHA512

                                bbe2185c9b03c1418cde017766213ae5318a6d252b26ebc054e854696def4c0ca4eef96424537c98579529538d07a2a73ade903007fb9b1e9458891f1175ffaa

                              • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

                                Filesize

                                2B

                                MD5

                                99914b932bd37a50b983c5e7c90ae93b

                                SHA1

                                bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                SHA256

                                44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                SHA512

                                27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                              • C:\Users\Admin\Desktop\release\Client-built.exe

                                Filesize

                                78KB

                                MD5

                                cc9554445f69381ef54240496ac7795c

                                SHA1

                                dc86958547617c61d2c209490f0ad016ef2a3000

                                SHA256

                                dbc0ed5b9de7972ebdb15393453d62d118358ae9e6e491ebd9b874544feef12e

                                SHA512

                                91db9d9c0c520ce12fa36c8b8024a0b48ef7a2f508d0bb4c4904d54cc0570624808011712c1c8b18a3bfbc144c4f045bd30cfed26d8f32f0c27f4f21ad98d4b3

                              • C:\Users\Admin\Downloads\release.zip.crdownload

                                Filesize

                                1.2MB

                                MD5

                                ddfe3dce9d847fb0ebb3ff65c05764b1

                                SHA1

                                bf5b875cd14710311117ddc47546ef1f70f26b1c

                                SHA256

                                0509e9b56f1cfa5da0f081b0e060d4789d41a73df0aa0d03ada199a70c2e3c7a

                                SHA512

                                5392c5aa2efa47850603b2837ecf04aa348ef8a2abc5f47125049bf322684d8ef7196d82e8749b6f5c1f8a9c250fa29a0be59a90eb0168d16eda4783ac4cd4df

                              • memory/2212-235-0x0000027393530000-0x0000027393548000-memory.dmp

                                Filesize

                                96KB

                              • memory/2212-236-0x00000273ADA70000-0x00000273ADC32000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/2212-237-0x00000273AE270000-0x00000273AE796000-memory.dmp

                                Filesize

                                5.1MB

                              • memory/4888-227-0x0000000005890000-0x0000000005D8E000-memory.dmp

                                Filesize

                                5.0MB

                              • memory/4888-228-0x0000000005390000-0x0000000005422000-memory.dmp

                                Filesize

                                584KB

                              • memory/4888-229-0x0000000005340000-0x000000000534A000-memory.dmp

                                Filesize

                                40KB

                              • memory/4888-230-0x0000000008570000-0x0000000008692000-memory.dmp

                                Filesize

                                1.1MB

                              • memory/4888-226-0x0000000000AE0000-0x0000000000AE8000-memory.dmp

                                Filesize

                                32KB