Overview
overview
10Static
static
10Discord-RA...ram.js
windows7-x64
3Discord-RA...ram.js
windows10-2004-x64
3Discord-RA...er.dll
windows7-x64
1Discord-RA...er.dll
windows10-2004-x64
1Discord-RA...er.dll
windows7-x64
1Discord-RA...er.dll
windows10-2004-x64
1Discord-RA...am.dll
windows7-x64
1Discord-RA...am.dll
windows10-2004-x64
1Discord-RA...it.exe
windows7-x64
10Discord-RA...it.exe
windows10-2004-x64
Discord-RA...it.exe
windows7-x64
10Discord-RA...it.exe
windows10-2004-x64
10Discord-RA...ib.dll
windows7-x64
1Discord-RA...ib.dll
windows10-2004-x64
1Discord-RA...ib.dll
windows7-x64
1Discord-RA...ib.dll
windows10-2004-x64
1Discord-RA...ib.dll
windows7-x64
1Discord-RA...ib.dll
windows10-2004-x64
1Discord-RA...er.ps1
windows7-x64
3Discord-RA...er.ps1
windows10-2004-x64
3Discord-RA...ser.js
windows7-x64
3Discord-RA...ser.js
windows10-2004-x64
3Discord-RA...ble.js
windows7-x64
3Discord-RA...ble.js
windows10-2004-x64
3Discord-RA...eam.js
windows7-x64
3Discord-RA...eam.js
windows10-2004-x64
3Discord-RA...ull.js
windows7-x64
3Discord-RA...ull.js
windows10-2004-x64
3Discord-RA...ect.js
windows7-x64
3Discord-RA...ect.js
windows10-2004-x64
3Discord-RA...tor.js
windows7-x64
3Discord-RA...tor.js
windows10-2004-x64
3Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 18:08
Behavioral task
behavioral1
Sample
Discord-RAT-2.0-2.0/Discord rat/Program.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Discord-RAT-2.0-2.0/Discord rat/Program.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/PasswordStealer.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/PasswordStealer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Token grabber.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Token grabber.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Webcam.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Webcam.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/rootkit.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/rootkit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/unrootkit.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/unrootkit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net35/dnlib.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net35/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net45/dnlib.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net45/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/netstandard2.0/dnlib.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/netstandard2.0/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Discord-RAT-2.0-2.0/Token grabber/grabber.ps1
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Discord-RAT-2.0-2.0/Token grabber/grabber.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/ASN1StreamParser.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/ASN1StreamParser.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Encodable.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Encodable.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1InputStream.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1InputStream.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Null.js
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Null.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Object.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Object.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1ObjectDescriptor.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1ObjectDescriptor.js
Resource
win10v2004-20241007-en
Errors
General
-
Target
Discord-RAT-2.0-2.0/Discord rat/Resources/rootkit.exe
-
Size
223KB
-
MD5
d72fea64a05b3f7dce725352d7c1d032
-
SHA1
9c27e234567d237d9c495353567f2efa42e8f616
-
SHA256
8fdae5b4490183c9057a684f0ac2f82dd5c8911cb2f43a54ff47a9ad6e93952a
-
SHA512
56bb1c4d83587ecc5f8bb41882d449e1812cdf1db1fee4068f5ef1b49f28d3e0af95e14f306d494a6c6cd4771c052360a96388f59bfa409affb3b21790da00d3
-
SSDEEP
6144:wguKV5BwUnZqazMhD9RLJt88sndcP8pPyDvUGOks:kKLBwiZlzMB9xgndcP88DvvP
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
rootkit.exedescription pid process target process PID 3668 created 612 3668 rootkit.exe winlogon.exe -
Drops file in System32 directory 3 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
rootkit.exedescription pid process target process PID 3668 set thread context of 4176 3668 rootkit.exe dllhost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rootkit.exedllhost.exepid process 3668 rootkit.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe -
Suspicious behavior: LoadsDriver 64 IoCs
Processes:
pid process 2892 3928 1184 3468 4992 4132 4388 3264 2700 4840 4512 4540 2196 3668 4520 4480 680 4672 4912 3724 2188 2192 4116 648 4608 1812 4552 1344 3776 100 4072 2808 2068 3416 452 3412 3192 1996 1500 4980 3452 1924 5024 1744 828 1864 4660 316 3332 4616 2660 3080 1464 1032 1204 1208 1252 1316 1524 1880 2712 756 3308 4860 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
rootkit.exedllhost.exeExplorer.EXEsvchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 3668 rootkit.exe Token: SeDebugPrivilege 3668 rootkit.exe Token: SeDebugPrivilege 4176 dllhost.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeAuditPrivilege 2784 svchost.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Explorer.EXEpid process 3392 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
rootkit.exedllhost.exelsass.exedescription pid process target process PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 3668 wrote to memory of 4176 3668 rootkit.exe dllhost.exe PID 4176 wrote to memory of 612 4176 dllhost.exe winlogon.exe PID 4176 wrote to memory of 668 4176 dllhost.exe lsass.exe PID 4176 wrote to memory of 948 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 60 4176 dllhost.exe dwm.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 4176 wrote to memory of 388 4176 dllhost.exe svchost.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 4176 wrote to memory of 860 4176 dllhost.exe svchost.exe PID 668 wrote to memory of 2764 668 lsass.exe sysmon.exe PID 4176 wrote to memory of 1064 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1080 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1216 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1228 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1308 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1332 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1356 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1468 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1492 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1512 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1588 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1664 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1728 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1780 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1804 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1892 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1964 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1984 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1504 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1704 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2096 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2152 4176 dllhost.exe spoolsv.exe PID 4176 wrote to memory of 2260 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2384 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2512 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2520 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2648 4176 dllhost.exe sihost.exe PID 4176 wrote to memory of 2688 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2728 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2764 4176 dllhost.exe sysmon.exe PID 4176 wrote to memory of 2784 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2800 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2828 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 2848 4176 dllhost.exe taskhostw.exe PID 4176 wrote to memory of 2976 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 1048 4176 dllhost.exe unsecapp.exe PID 4176 wrote to memory of 3340 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 3392 4176 dllhost.exe Explorer.EXE PID 4176 wrote to memory of 3540 4176 dllhost.exe svchost.exe PID 4176 wrote to memory of 3716 4176 dllhost.exe DllHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 60 -s 34323⤵PID:4440
-
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{edbc1b19-e968-4280-b31a-80e545967cba}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1228
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1492
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1588
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2648
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1920
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2012
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1816
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3356
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:212
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3076
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2096
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2728
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2976
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3340
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0-2.0\Discord rat\Resources\rootkit.exe"C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0-2.0\Discord rat\Resources\rootkit.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3716
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4352
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2868
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1908
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1976
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2968
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1276