Analysis
-
max time kernel
1049s -
max time network
965s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 20:32
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0 (MTI1MTI3MTQ1NTAxOTM2ODQ0OQ.GrcSL0.Nrr6S8xQPBnkknsab2ACedArN5PH01fOUvBGe0) (1251234516341882890)
Resource
win10v2004-20240508-en
General
-
Target
https://github.com/moom825/Discord-RAT-2.0 (MTI1MTI3MTQ1NTAxOTM2ODQ0OQ.GrcSL0.Nrr6S8xQPBnkknsab2ACedArN5PH01fOUvBGe0) (1251234516341882890)
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133628707770146085" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 116 chrome.exe 116 chrome.exe 4832 chrome.exe 4832 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe Token: SeShutdownPrivilege 116 chrome.exe Token: SeCreatePagefilePrivilege 116 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe 116 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 5076 116 chrome.exe 82 PID 116 wrote to memory of 5076 116 chrome.exe 82 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 380 116 chrome.exe 85 PID 116 wrote to memory of 3008 116 chrome.exe 86 PID 116 wrote to memory of 3008 116 chrome.exe 86 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87 PID 116 wrote to memory of 4864 116 chrome.exe 87
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/moom825/Discord-RAT-2.0 (MTI1MTI3MTQ1NTAxOTM2ODQ0OQ.GrcSL0.Nrr6S8xQPBnkknsab2ACedArN5PH01fOUvBGe0) (1251234516341882890)1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9272bab58,0x7ff9272bab68,0x7ff9272bab782⤵PID:5076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1628 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:22⤵PID:380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1944 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:82⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2228 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:82⤵PID:4864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3040 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3044 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:12⤵PID:404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4380 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:82⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:82⤵PID:812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=4384 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:12⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4692 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:12⤵PID:5032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4524 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:12⤵PID:3100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=4840 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:12⤵PID:840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1440 --field-trial-handle=1960,i,5145318589130211389,11476593653216821811,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5ed2daf2f01c9d92d95bfd840ce767b45
SHA1cf0ad9bd1371ed10687c99ebd1a2dca2502c18cb
SHA2562e3c314240891963a7a74054746f16e77b42a8ccd1dc90d299daa8a370117a6d
SHA512d95a4ba753780373ad169f669de2bae53c70e306835fb3f6d7655ccabe528f728b5ff9d85423ddd3db4962f2056c7a632f31445ad5498edca850600565c48a11
-
Filesize
7KB
MD51da23d5add600ba53ef6922e2591c2db
SHA164f02769f3bbcb5fe4f91954d8a94ec44655d728
SHA2560defdfbe8fe02bf147907652bd9ea153938ffe68dee87a9923a999f5897389ea
SHA5128193cea7be105ef9828f28ff0706bef448357fc834131c6c3ff3ff1529e83e9e848b82c36b6c53f257098c33732825de77be7bf9023048a643f6b03db6677bda
-
Filesize
255KB
MD57be285aaa1685bd3a1e9f9e13db2c19e
SHA105e722179ff2227db2071da7b44287af669e7e91
SHA256039afd99ce86bfed4bdde68bc604ff4e86178feb5b7411b53de25cd2d6209226
SHA512177a8c5e0cd02d7bd092d3e2c5ac1528c570a3951fe978fb77a0a705f8b11d00c4953a34aed29475f2994abd5cb580e46373d16f935c68ff4d450799a4cd8341
-
Filesize
255KB
MD51b3aad0bbe8963037aca8c83be54ca34
SHA14cefc11ca761920dbedf76de6b77bd2df8ae8fc2
SHA2561c505fc29bbabfae523ef69ffab6ca6ec9ecdb0efcbc50d95da6bb5417fc45e0
SHA512568ea69ab347961d4623091c9e3d90457bcc61bd8881763862a27a24bc7a986f454e7c26c5ff6b43a6662601211fbf1025853099715d2fc874630e27509e7e26