Analysis

  • max time kernel
    44s
  • max time network
    43s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 08:49

General

  • Target

    https://mega.nz/folder/3ExDlT4b#3AwpMYtmlnh9srWS8RihVw

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTE5NjA4ODM3NDEwOTQxNzYxMw.GXCO_h.FzCXXHzUl_a4K5zaggRAi_SdLV7ZD0of0VLMPY

  • server_id

    1196038125751906374

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Executes dropped EXE 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/folder/3ExDlT4b#3AwpMYtmlnh9srWS8RihVw
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7da1ab58,0x7ffd7da1ab68,0x7ffd7da1ab78
      2⤵
        PID:3200
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1592 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:2
        2⤵
          PID:1804
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
          2⤵
            PID:4248
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2224 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
            2⤵
              PID:1316
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2996 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:1
              2⤵
                PID:4464
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3004 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:1
                2⤵
                  PID:1736
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4444 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                  2⤵
                    PID:1812
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                    2⤵
                      PID:1380
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4748 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                      2⤵
                        PID:1668
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5080 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                        2⤵
                          PID:3920
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5216 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                          2⤵
                            PID:380
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4092 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                            2⤵
                              PID:4880
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5540 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                              2⤵
                                PID:3776
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5412 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                                2⤵
                                  PID:3696
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5080 --field-trial-handle=1900,i,6722174475473504687,11836805420696156191,131072 /prefetch:8
                                  2⤵
                                    PID:380
                                  • C:\Users\Admin\Downloads\generator.exe
                                    "C:\Users\Admin\Downloads\generator.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:864
                                  • C:\Users\Admin\Downloads\generator.exe
                                    "C:\Users\Admin\Downloads\generator.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    PID:1640
                                • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                  "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                  1⤵
                                    PID:5076
                                  • C:\Windows\system32\AUDIODG.EXE
                                    C:\Windows\system32\AUDIODG.EXE 0x304 0x308
                                    1⤵
                                      PID:3996
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3824,i,8810623976767776473,12198967845557146846,262144 --variations-seed-version --mojo-platform-channel-handle=3804 /prefetch:8
                                      1⤵
                                        PID:544

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v13

                                      Discovery

                                      Query Registry

                                      1
                                      T1012

                                      System Information Discovery

                                      1
                                      T1082

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000023
                                        Filesize

                                        21KB

                                        MD5

                                        b1dfa46eee24480e9211c9ef246bbb93

                                        SHA1

                                        80437c519fac962873a5768f958c1c350766da15

                                        SHA256

                                        fc79a40b2172a04a5c2fe0d5111ebeb401b9a84ce80c6e9e5b96c9c73c9b0398

                                        SHA512

                                        44aefedf8a4c0c8cbc43c1260dc2bbc4605f83a189b6ef50e99058f54a58b61eb88af3f08164671bad4bd9c5e3b97b755f2fa433490bef56aa15cdf37fb412b6

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000024
                                        Filesize

                                        36KB

                                        MD5

                                        f90ac636cd679507433ab8e543c25de5

                                        SHA1

                                        3a8fe361c68f13c01b09453b8b359722df659b84

                                        SHA256

                                        5b4c63b2790a8f63c12368f11215a4ffec30c142371a819a81180a32baeb2bce

                                        SHA512

                                        7641a3610ad6516c9ecd0d5f4e5fa1893c7c60ca3ba8ae2e1b3b0cc3a72f7f9bef4c776a1f2fc52f366bd28a419ae3594a6576e886e79a20ebd98b55b2acc967

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index
                                        Filesize

                                        72B

                                        MD5

                                        7d97cc80261ab90a79aa275adb01fd27

                                        SHA1

                                        971dd09d877786b096fb37e7b67cd63bfd5a8529

                                        SHA256

                                        2b0e3976770c1debab848a7f4e20003dcbc75b7f344b4c03b505902ba747eed2

                                        SHA512

                                        bfefd3f3da2e87f277ba6438e96e3ea8e95746de27f4641ff1af678b17896a8e3c7a8b6eab0cd970b3acfd900c969c2a4d1b66234d1d375774d6f896dd321e7c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
                                        Filesize

                                        521B

                                        MD5

                                        721eb799b3d6b178a834391aee5f936a

                                        SHA1

                                        642afe91c020290eec9f977a906091d773eb4e91

                                        SHA256

                                        8d5d86135247221ebdaf30d496d6d7337110ee29b5e2e472e577239dc904228c

                                        SHA512

                                        c3533fb06f51b801f583c4579349a883b224efc58c9ff97a19ac49e483a843cc64ee064091dd094987fa4146b7fcd8692a39db32c780a90b9e3b1d998fe4196c

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                        Filesize

                                        7KB

                                        MD5

                                        1f263ba022f742af8a6e2e6628ae10f2

                                        SHA1

                                        f224a590163cf1bf7a5385049c3bc64257f37d64

                                        SHA256

                                        fa3f5e64807c2aaa378c2bf2b6714ec769ad5ef800a4f02b7b5c0da572c3fd63

                                        SHA512

                                        9e642488772cf5544bc5e8314811e278b280de1f7a0d9bc4106923ee96b93172f705de4cf38a7ce60bb083e84bf7ee33e277932de1b65817dbf1bc532fe0fce6

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
                                        Filesize

                                        7KB

                                        MD5

                                        195dfb33068efdd0518d37437413df18

                                        SHA1

                                        75fa1659b990704b610ec9d547ba6abdfb6b48ab

                                        SHA256

                                        2a27188d4871b1e01f9a4ac757721f93e99228108a81f154d77483f5d23d9826

                                        SHA512

                                        5de0d28d0b9417f249cb6be5e1f1e76330d1fa6027ff3cd45ca2840d07a18d9383f076972b03d1881dbf37b57dcf6a30dc52315a2ee820876a718f71ef58f816

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
                                        Filesize

                                        96B

                                        MD5

                                        a2b318d813b543b3df500b6e20b6b956

                                        SHA1

                                        1864b7089c956d30dd4477014dc69a7aef029de2

                                        SHA256

                                        da7b7adff02649771e64964c7fb56d53caea7e46fa737605392f152e3acdec5d

                                        SHA512

                                        e6b891ef6413082d5f8f2824090d2470612f383b0892cc054acaeb5c6abcc0078ec07805b1f40cbcd28bdc7dc347256833959b01311dc6b1e71da2ce28e09b22

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
                                        Filesize

                                        144KB

                                        MD5

                                        5d4f6a9bad0f1fd5efe0756aa51982d5

                                        SHA1

                                        4991a6f5c1a91bd4c99af361881ced3605d5f369

                                        SHA256

                                        275593a85bf5a6b9285572d930d219acb61f9b4dea5fc20941a0e4ea667f8228

                                        SHA512

                                        00370679ab097414807d499aadcdc92c829777732ca03bca1c52f12fd5b1c3dedf24cc7b4ead57c4a4f65ae278e5a1b6647faf78e45d9f47deb000e32c2ddf33

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache
                                        Filesize

                                        101KB

                                        MD5

                                        4e30acc46041986c80ce85d21e3b244f

                                        SHA1

                                        62aa89b2f5167426c4652cdb9d3f28b82a7c3060

                                        SHA256

                                        9c42ec9b0c2f78522be69d8d48d7dbe9709e425c7f31266c90605bed9e1a5628

                                        SHA512

                                        ab735544e60816cb92ed567f19c84139d721d6e5ae0bc659d8d5be8d303d2b101581e8f26d56c1ff7788bbd65f87572e313d6f070e1ba38b8a17b1d87971c5d9

                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe58b273.TMP
                                        Filesize

                                        94KB

                                        MD5

                                        64ffb4a1bf0ac10d7c31c7fbd3d42d86

                                        SHA1

                                        1b00f2012bd82ca4ed5729130f3d02d4c1016200

                                        SHA256

                                        a0327773ff0831365fee711a34659022b3f84ff438e70259b6b1f9514cb5f198

                                        SHA512

                                        cbe55a0279ca810f5ebc7cbf8efc7606acffbc0af7f7551c8821d5aaf3c3ffc9ea6c653ff7addc84642ec9e9fe78d6a510ee535f7c3ac357a72f66db170557ea

                                      • C:\Users\Admin\Downloads\generator.exe
                                        Filesize

                                        78KB

                                        MD5

                                        31bcda599c19f1632e95d5a507e0ebbf

                                        SHA1

                                        7c005dab2c1ffc4daba3f712a9cc2d8938fb8a4d

                                        SHA256

                                        f65160ca4fdef810b8f508ff89c5d6aa179f016a406daa6821cf547dfe6713ce

                                        SHA512

                                        575bda4b684b9cf786e2de32b69d5df31e49f15964113260b74058027a305985ea0538276717547ac630f1d07ef84913b5c21e9b32df6d28db0c5da637f944e5

                                      • \??\pipe\crashpad_3512_IWUYHTSEQZYVNRFJ
                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/864-230-0x0000027DD60C0000-0x0000027DD60D8000-memory.dmp
                                        Filesize

                                        96KB

                                      • memory/864-231-0x00007FFD6BBB3000-0x00007FFD6BBB5000-memory.dmp
                                        Filesize

                                        8KB

                                      • memory/864-232-0x0000027DF06B0000-0x0000027DF0872000-memory.dmp
                                        Filesize

                                        1.8MB

                                      • memory/864-233-0x00007FFD6BBB0000-0x00007FFD6C671000-memory.dmp
                                        Filesize

                                        10.8MB

                                      • memory/864-234-0x0000027DF1B30000-0x0000027DF2058000-memory.dmp
                                        Filesize

                                        5.2MB

                                      • memory/1640-256-0x00007FFD6BBB0000-0x00007FFD6C671000-memory.dmp
                                        Filesize

                                        10.8MB