Analysis

  • max time kernel
    1680s
  • max time network
    1685s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-06-2024 16:30

General

  • Target

    https://cdn.discordapp.com/attachments/1255165018316476447/1255198043645673543/Kinito_Pet.exe?ex=667c41c6&is=667af046&hm=218facb0d6c8762b34d2aa3055ae6ff00e5afa9455f1efc125853af5a28b493a&

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI0MDA4ODk5MTQwODE5MzYyOA.GRW5NI.uFPBjoMjH0IQ-FgxpiJSv246Xes3LsI1_5H1Y8

  • server_id

    1239434854953648229

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 35 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1255165018316476447/1255198043645673543/Kinito_Pet.exe?ex=667c41c6&is=667af046&hm=218facb0d6c8762b34d2aa3055ae6ff00e5afa9455f1efc125853af5a28b493a&
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff947cb3cb8,0x7ff947cb3cc8,0x7ff947cb3cd8
      2⤵
        PID:4648
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:2
        2⤵
          PID:4312
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4268
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:8
          2⤵
            PID:1336
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:1
            2⤵
              PID:1688
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:1
              2⤵
                PID:1084
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:1
                2⤵
                  PID:1888
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5348 /prefetch:8
                  2⤵
                    PID:3308
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5488 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2272
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:8
                    2⤵
                    • NTFS ADS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3876
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3816
                  • C:\Users\Admin\Downloads\Kinito_Pet.exe
                    "C:\Users\Admin\Downloads\Kinito_Pet.exe"
                    2⤵
                    • Executes dropped EXE
                    PID:3500
                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\test.exe
                      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\test.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4528
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:1
                    2⤵
                      PID:3176
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                      2⤵
                        PID:4128
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:1
                        2⤵
                          PID:2648
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:1
                          2⤵
                            PID:3196
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,1037842758761315186,7092906023049553805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6084 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:424
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:1764
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:5112
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:3060
                              • C:\Users\Admin\Downloads\Kinito_Pet.exe
                                "C:\Users\Admin\Downloads\Kinito_Pet.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:1972
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX1\test.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX1\test.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3780
                              • C:\Users\Admin\Downloads\Kinito_Pet.exe
                                "C:\Users\Admin\Downloads\Kinito_Pet.exe"
                                1⤵
                                • Executes dropped EXE
                                PID:1576
                                • C:\Users\Admin\AppData\Local\Temp\RarSFX2\test.exe
                                  "C:\Users\Admin\AppData\Local\Temp\RarSFX2\test.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4296

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                6f738fcca0370135adb459fac0d129b9

                                SHA1

                                5af8b563ee883e0b27c1c312dc42245135f7d116

                                SHA256

                                1d37a186c9be361a782dd6e45fe98b1f74215a26990af945a2b8b9aa4587ec63

                                SHA512

                                8749675cdd8f667ff7ca0a0f04d5d9cad9121fd02ed786e66bcd3c1278d8eb9ce5995d3e38669612bdc4dccae83a2d1b10312db32d5097ef843512244f6f769a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                68de3df9998ac29e64228cf1c32c9649

                                SHA1

                                be17a7ab177bef0f03c9d7bd2f25277d86e8fcee

                                SHA256

                                96825c1e60e4a87dc5dbae78b97104e6968275fa1602c69053d0192cae143f43

                                SHA512

                                1658b0bc504a8a5c57c496477cd800a893d751f03d632ef50aff9327cd33ad0e4e4f27bcb85b20bd22bef2ca65600b7d92e2a1f18fd3d08ad6391983de77beaf

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\72482797-1500-40c1-a271-9e62a74fe5fe.tmp

                                Filesize

                                5KB

                                MD5

                                f3598e71248dcbcd2ecc5568f579d50c

                                SHA1

                                338c570ed7395948c08087c8f41f1dba9185f620

                                SHA256

                                d09b2e7f3047de3e5bd788399518f264c33c53f14f0d2a014eab337e07e46776

                                SHA512

                                14c9b5d4fe513b05334ced08bbe02b2cb792fa70b09e62793d638589d5f122eca66197db057a5d55672f3b957a2aca0d796d0e17b73f79caed173422b6afe274

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                Filesize

                                186B

                                MD5

                                094ab275342c45551894b7940ae9ad0d

                                SHA1

                                2e7ce26fe2eb9be641ae929d0c9cc0dfa26c018e

                                SHA256

                                ef1739b833a1048ee1bd55dcbac5b1397396faca1ad771f4d6c2fe58899495a3

                                SHA512

                                19d0c688dc1121569247111e45de732b2ab86c71aecdde34b157cfd1b25c53473ed3ade49a97f8cb2ddc4711be78fa26c9330887094e031e9a71bb5c29080b0d

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                c3191c6cd86eb0ba7118aa64b6872276

                                SHA1

                                0ea8baa480498d308cd46038db755df7a40fd506

                                SHA256

                                fdc55b909d088b0a2e07d49b11ac8b3fa4e37f94b83812fb1560b7a52dbef0ce

                                SHA512

                                e58f7daa846dc95308b38515a8893078a024585c552b9303c99f68aadfe0cccf4aa469a448ae004941ea377a8d5b73e6aeaecae883528decd2eda6324f7e6164

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                29ca131d2736ae5901d26667bd710dae

                                SHA1

                                2f1830fa623bab3a8b2438466b3e4b326ad6cd5a

                                SHA256

                                11d4f8bb3e6a4750c9eba0467910e4a6727f51733fbe2ffcdb510b514d3d5eb5

                                SHA512

                                54c7decee32bab49552773543a7b2c7a7f464d58ae6ad6f3ea39f4576dc8fc318299700848486c165b94aaf375bdf4414e99f37756c2621bd68819f192114749

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                6a6d365e710f87d73fe2f2f30fd730fe

                                SHA1

                                22922a969e3b25f60f0cc76bb23908965f1d0cc1

                                SHA256

                                f6ba07d22dbdc0ecb78454c578af1a8a596a977d928f676f9e857e488c9c8d49

                                SHA512

                                ea083e607666ff1e0391573bd0c47dbf4ffa002aee320584b28b24054c2553663761d543c43b8da61b1d1c2022de3e1b76bc99e8c641cb0a25bf55671ecb1de5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                462eeb9f755a7697805b9055119f2fb3

                                SHA1

                                59552c89dd22250bb41ed0eed551b7dce0f2ed2d

                                SHA256

                                fd7c4f1e6efff01c9f5cb25946bb4f7fa0b5a1b0b1953cc6090947ad1d361c9e

                                SHA512

                                28e22ad6096a71666786343a3b2576df919f52bee1cc26465f7cfef7a0b51c711ec7fe512f9ab22ec542d04bc05d022b7ec09ac6a796bbb69ec3209767039125

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\test.exe

                                Filesize

                                78KB

                                MD5

                                ae9c47b621a083a0b0681b7aa9530946

                                SHA1

                                6cdd316cb5b2869927b42597b25cf7d495d5f9a4

                                SHA256

                                aa3727520be4bc19a78da7f575a9dcc93c0b5c2743725300f942e7dee2eaa3b1

                                SHA512

                                ae6330429bb9bc21709162296de375a79f5b8b89b3f4b58a5da12737b2fe0b44570e5eaab8fbb92ce190600fb1fc2a5f91fa425a719d8363a481d99f173bb109

                              • C:\Users\Admin\AppData\Local\Temp\RarSFX2\message.vbs

                                Filesize

                                85B

                                MD5

                                0a1ad62f6ca61c35292fbb6a6ba92012

                                SHA1

                                a197804ef65d506aae02ee680ac0efa24b40b93d

                                SHA256

                                872a5050ddab629a34445e745086a43ab4d293a8ca5d1062b6a066352c678cc4

                                SHA512

                                e55cfcb712a564053cd3d831a6b5c1105411cee1f0986c02badd73ecb603fdd2c5bd46aae5d601145c08c41e05f9da7250aecbe4574c5a505511a87e56ce6d34

                              • C:\Users\Admin\Downloads\Kinito_Pet.exe:Zone.Identifier

                                Filesize

                                222B

                                MD5

                                665a4249ca4cc8bb4e63d9ab801761b9

                                SHA1

                                15aaf348b9b0b485b8dea023f6e81f3108a7bb9d

                                SHA256

                                55c5e4d2b6fe97f74d9f299efbfb402f717c8bd0172bf1b52905c99027fb1041

                                SHA512

                                58fe164223b9a9dd4e0894e945461e9a9acbc0cedf421c5cf0d6f2774ec04a8882d867b08048b51fc46bb311cf6080054dfef21e252931e241961b9b302ad51b

                              • C:\Users\Admin\Downloads\Unconfirmed 804200.crdownload

                                Filesize

                                536KB

                                MD5

                                ad96c8a2754e9842815afb1cfdb13581

                                SHA1

                                422d8a2a47975ca27ae9824a99e438d4e28ece68

                                SHA256

                                76629cc6ae5d1de771cf074cee28eb1b7e5ce236061a19f76fee039ac8f4d81d

                                SHA512

                                f4250022659705cb7e75530af1ec64f732942bc3db305d5e3e716eda61cfd8308ee2ca0d89b499696b8e7e2bdf8edae7b1e87387dfdc8dcd210eb9485efb70a8

                              • memory/4528-98-0x0000021A704A0000-0x0000021A709C8000-memory.dmp

                                Filesize

                                5.2MB

                              • memory/4528-97-0x0000021A6FCA0000-0x0000021A6FE62000-memory.dmp

                                Filesize

                                1.8MB

                              • memory/4528-96-0x0000021A55420000-0x0000021A55438000-memory.dmp

                                Filesize

                                96KB