Overview
overview
10Static
static
10Discord-RA...ram.js
windows7-x64
3Discord-RA...ram.js
windows10-2004-x64
3Discord-RA...er.dll
windows7-x64
1Discord-RA...er.dll
windows10-2004-x64
1Discord-RA...er.dll
windows7-x64
1Discord-RA...er.dll
windows10-2004-x64
1Discord-RA...am.dll
windows7-x64
1Discord-RA...am.dll
windows10-2004-x64
1Discord-RA...it.exe
windows7-x64
10Discord-RA...it.exe
windows10-2004-x64
Discord-RA...it.exe
windows7-x64
10Discord-RA...it.exe
windows10-2004-x64
10Discord-RA...ib.dll
windows7-x64
1Discord-RA...ib.dll
windows10-2004-x64
1Discord-RA...ib.dll
windows7-x64
1Discord-RA...ib.dll
windows10-2004-x64
1Discord-RA...ib.dll
windows7-x64
1Discord-RA...ib.dll
windows10-2004-x64
1Discord-RA...er.ps1
windows7-x64
3Discord-RA...er.ps1
windows10-2004-x64
3Discord-RA...ser.js
windows7-x64
3Discord-RA...ser.js
windows10-2004-x64
3Discord-RA...ble.js
windows7-x64
3Discord-RA...ble.js
windows10-2004-x64
3Discord-RA...eam.js
windows7-x64
3Discord-RA...eam.js
windows10-2004-x64
3Discord-RA...ull.js
windows7-x64
3Discord-RA...ull.js
windows10-2004-x64
3Discord-RA...ect.js
windows7-x64
3Discord-RA...ect.js
windows10-2004-x64
3Discord-RA...tor.js
windows7-x64
3Discord-RA...tor.js
windows10-2004-x64
3Analysis
-
max time kernel
62s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 18:08
Behavioral task
behavioral1
Sample
Discord-RAT-2.0-2.0/Discord rat/Program.js
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Discord-RAT-2.0-2.0/Discord rat/Program.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/PasswordStealer.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/PasswordStealer.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Token grabber.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Token grabber.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Webcam.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/Webcam.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/rootkit.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/rootkit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/unrootkit.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Discord-RAT-2.0-2.0/Discord rat/Resources/unrootkit.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net35/dnlib.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net35/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net45/dnlib.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/net45/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/netstandard2.0/dnlib.dll
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Discord-RAT-2.0-2.0/Discord rat/packages/dnlib.3.5.0/lib/netstandard2.0/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Discord-RAT-2.0-2.0/Token grabber/grabber.ps1
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
Discord-RAT-2.0-2.0/Token grabber/grabber.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/ASN1StreamParser.js
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/ASN1StreamParser.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Encodable.js
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Encodable.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1InputStream.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1InputStream.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Null.js
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Null.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Object.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1Object.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1ObjectDescriptor.js
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Discord-RAT-2.0-2.0/Token grabber/src/asn1/Asn1ObjectDescriptor.js
Resource
win10v2004-20241007-en
Errors
General
-
Target
Discord-RAT-2.0-2.0/Discord rat/Resources/rootkit.exe
-
Size
223KB
-
MD5
d72fea64a05b3f7dce725352d7c1d032
-
SHA1
9c27e234567d237d9c495353567f2efa42e8f616
-
SHA256
8fdae5b4490183c9057a684f0ac2f82dd5c8911cb2f43a54ff47a9ad6e93952a
-
SHA512
56bb1c4d83587ecc5f8bb41882d449e1812cdf1db1fee4068f5ef1b49f28d3e0af95e14f306d494a6c6cd4771c052360a96388f59bfa409affb3b21790da00d3
-
SSDEEP
6144:wguKV5BwUnZqazMhD9RLJt88sndcP8pPyDvUGOks:kKLBwiZlzMB9xgndcP88DvvP
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 3668 created 612 3668 rootkit.exe 5 -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776 svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3668 set thread context of 4176 3668 rootkit.exe 85 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3668 rootkit.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe 4176 dllhost.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2892 Process not Found 3928 Process not Found 1184 Process not Found 3468 Process not Found 4992 Process not Found 4132 Process not Found 4388 Process not Found 3264 Process not Found 2700 Process not Found 4840 Process not Found 4512 Process not Found 4540 Process not Found 2196 Process not Found 3668 Process not Found 4520 Process not Found 4480 Process not Found 680 Process not Found 4672 Process not Found 4912 Process not Found 3724 Process not Found 2188 Process not Found 2192 Process not Found 4116 Process not Found 648 Process not Found 4608 Process not Found 1812 Process not Found 4552 Process not Found 1344 Process not Found 3776 Process not Found 100 Process not Found 4072 Process not Found 2808 Process not Found 2068 Process not Found 3416 Process not Found 452 Process not Found 3412 Process not Found 3192 Process not Found 1996 Process not Found 1500 Process not Found 4980 Process not Found 3452 Process not Found 1924 Process not Found 5024 Process not Found 1744 Process not Found 828 Process not Found 1864 Process not Found 4660 Process not Found 316 Process not Found 3332 Process not Found 4616 Process not Found 2660 Process not Found 3080 Process not Found 1464 Process not Found 1032 Process not Found 1204 Process not Found 1208 Process not Found 1252 Process not Found 1316 Process not Found 1524 Process not Found 1880 Process not Found 2712 Process not Found 756 Process not Found 3308 Process not Found 4860 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3668 rootkit.exe Token: SeDebugPrivilege 3668 rootkit.exe Token: SeDebugPrivilege 4176 dllhost.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeAuditPrivilege 2784 svchost.exe Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeShutdownPrivilege 3392 Explorer.EXE Token: SeCreatePagefilePrivilege 3392 Explorer.EXE Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe Token: SeLoadDriverPrivilege 1704 svchost.exe Token: SeSystemtimePrivilege 1704 svchost.exe Token: SeBackupPrivilege 1704 svchost.exe Token: SeRestorePrivilege 1704 svchost.exe Token: SeShutdownPrivilege 1704 svchost.exe Token: SeSystemEnvironmentPrivilege 1704 svchost.exe Token: SeUndockPrivilege 1704 svchost.exe Token: SeManageVolumePrivilege 1704 svchost.exe Token: SeAssignPrimaryTokenPrivilege 1704 svchost.exe Token: SeIncreaseQuotaPrivilege 1704 svchost.exe Token: SeSecurityPrivilege 1704 svchost.exe Token: SeTakeOwnershipPrivilege 1704 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3392 Explorer.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 3668 wrote to memory of 4176 3668 rootkit.exe 85 PID 4176 wrote to memory of 612 4176 dllhost.exe 5 PID 4176 wrote to memory of 668 4176 dllhost.exe 7 PID 4176 wrote to memory of 948 4176 dllhost.exe 12 PID 4176 wrote to memory of 60 4176 dllhost.exe 13 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 4176 wrote to memory of 388 4176 dllhost.exe 14 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 4176 wrote to memory of 860 4176 dllhost.exe 15 PID 668 wrote to memory of 2764 668 lsass.exe 47 PID 4176 wrote to memory of 1064 4176 dllhost.exe 16 PID 4176 wrote to memory of 1080 4176 dllhost.exe 18 PID 4176 wrote to memory of 1216 4176 dllhost.exe 19 PID 4176 wrote to memory of 1228 4176 dllhost.exe 20 PID 4176 wrote to memory of 1308 4176 dllhost.exe 21 PID 4176 wrote to memory of 1332 4176 dllhost.exe 22 PID 4176 wrote to memory of 1356 4176 dllhost.exe 23 PID 4176 wrote to memory of 1468 4176 dllhost.exe 24 PID 4176 wrote to memory of 1492 4176 dllhost.exe 25 PID 4176 wrote to memory of 1512 4176 dllhost.exe 26 PID 4176 wrote to memory of 1588 4176 dllhost.exe 27 PID 4176 wrote to memory of 1664 4176 dllhost.exe 28 PID 4176 wrote to memory of 1728 4176 dllhost.exe 29 PID 4176 wrote to memory of 1780 4176 dllhost.exe 30 PID 4176 wrote to memory of 1804 4176 dllhost.exe 31 PID 4176 wrote to memory of 1892 4176 dllhost.exe 32 PID 4176 wrote to memory of 1964 4176 dllhost.exe 33 PID 4176 wrote to memory of 1984 4176 dllhost.exe 34 PID 4176 wrote to memory of 1504 4176 dllhost.exe 35 PID 4176 wrote to memory of 1704 4176 dllhost.exe 36 PID 4176 wrote to memory of 2096 4176 dllhost.exe 37 PID 4176 wrote to memory of 2152 4176 dllhost.exe 38 PID 4176 wrote to memory of 2260 4176 dllhost.exe 40 PID 4176 wrote to memory of 2384 4176 dllhost.exe 41 PID 4176 wrote to memory of 2512 4176 dllhost.exe 42 PID 4176 wrote to memory of 2520 4176 dllhost.exe 43 PID 4176 wrote to memory of 2648 4176 dllhost.exe 44 PID 4176 wrote to memory of 2688 4176 dllhost.exe 45 PID 4176 wrote to memory of 2728 4176 dllhost.exe 46 PID 4176 wrote to memory of 2764 4176 dllhost.exe 47 PID 4176 wrote to memory of 2784 4176 dllhost.exe 48 PID 4176 wrote to memory of 2800 4176 dllhost.exe 49 PID 4176 wrote to memory of 2828 4176 dllhost.exe 50 PID 4176 wrote to memory of 2848 4176 dllhost.exe 51 PID 4176 wrote to memory of 2976 4176 dllhost.exe 52 PID 4176 wrote to memory of 1048 4176 dllhost.exe 53 PID 4176 wrote to memory of 3340 4176 dllhost.exe 55 PID 4176 wrote to memory of 3392 4176 dllhost.exe 56 PID 4176 wrote to memory of 3540 4176 dllhost.exe 57 PID 4176 wrote to memory of 3716 4176 dllhost.exe 58 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 60 -s 34323⤵PID:4440
-
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{edbc1b19-e968-4280-b31a-80e545967cba}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4176
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:948
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:388
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:860
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1080
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1216
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1228
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2848
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1308
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1468
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1492
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1588
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2648
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1920
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:2012
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:1816
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3356
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:212
-
-
C:\Windows\system32\sihost.exesihost.exe2⤵PID:3076
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1664
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1728
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1780
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1964
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1984
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:2096
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2152
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2260
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2688
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵
- Drops file in System32 directory
PID:2728
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2764
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2976
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3340
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0-2.0\Discord rat\Resources\rootkit.exe"C:\Users\Admin\AppData\Local\Temp\Discord-RAT-2.0-2.0\Discord rat\Resources\rootkit.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3668
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3716
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:4352
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3128
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3304
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:2868
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:1908
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4340
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:1976
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:2276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:2968
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2404
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:1552
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵PID:4692
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k WerSvcGroup1⤵PID:1276