Analysis

  • max time kernel
    27s
  • max time network
    32s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-07-2024 00:16

General

  • Target

    https://github.com/Yodusa/Discord-Account-Generator

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2MDQwNzQ1MjQyODUzMzgzMQ.GYv6Cs.bHorOgR3dzpv33F18dZaRpWKB43NnKIjozVcS8

  • server_id

    1260407315073597510

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 33 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Yodusa/Discord-Account-Generator
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3ad746f8,0x7fff3ad74708,0x7fff3ad74718
      2⤵
        PID:3356
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2
        2⤵
          PID:1012
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2336
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:8
          2⤵
            PID:4260
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
            2⤵
              PID:1640
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
              2⤵
                PID:3888
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                2⤵
                  PID:3956
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5520 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4208
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5656 /prefetch:8
                  2⤵
                    PID:388
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:1
                    2⤵
                      PID:760
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5924 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2936
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6040 /prefetch:1
                      2⤵
                        PID:5208
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:1
                        2⤵
                          PID:5216
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5776 /prefetch:1
                          2⤵
                            PID:5428
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2032,13944365438153234526,16488036814773422704,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6488 /prefetch:1
                            2⤵
                              PID:5436
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:3996
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4792
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:2164
                                • C:\Users\Admin\Downloads\Discord-Account-Generator-main\Discord-Account-Generator-main\main.exe
                                  "C:\Users\Admin\Downloads\Discord-Account-Generator-main\Discord-Account-Generator-main\main.exe"
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4720
                                • C:\Windows\system32\NOTEPAD.EXE
                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Discord-Account-Generator-main\Discord-Account-Generator-main\generated_tokens.txt
                                  1⤵
                                    PID:5172

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    1f9d180c0bcf71b48e7bc8302f85c28f

                                    SHA1

                                    ade94a8e51c446383dc0a45edf5aad5fa20edf3c

                                    SHA256

                                    a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc

                                    SHA512

                                    282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    60ead4145eb78b972baf6c6270ae6d72

                                    SHA1

                                    e71f4507bea5b518d9ee9fb2d523c5a11adea842

                                    SHA256

                                    b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7

                                    SHA512

                                    8cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    2KB

                                    MD5

                                    1f96c19a6a78c6046f87636f3427c3ae

                                    SHA1

                                    71c576af3d0f279496c7490081103ae2ace7e409

                                    SHA256

                                    fddb2c1df0e548afba0b1345741a5e0969a86e51d8f4f07025956bd98bae97b5

                                    SHA512

                                    82dd92c1c15e39db19f1e0fe5f10e3a680e6a59ff2fdf170cf4493831b9c039bf84d4765f6d139fa6c515e6312739e952286f49223b0c6cbedcdab6af6ed9dfa

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    a66071904f5370c88c1b7f41c4547b1c

                                    SHA1

                                    54ef7f7feb1e7077f7f55fe8d3b0189415c77415

                                    SHA256

                                    314035f34be9992947e1f8da87bf8761e6ff2fb5ce9209968d6b117e9e416fe1

                                    SHA512

                                    84087f86ca7e46ee75624a234a59172c26dedc418edbb28111c14fc40f5c15c1efb290ce091416f9fb97ce1f5a1fba5dac4f70e261a801cfb7a3cb1f20d57999

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    7dc3b41309976ea9296ca962cb7f863a

                                    SHA1

                                    e23e69bc588219c53283869ed7a709711d8933c2

                                    SHA256

                                    531860a16b21ec31ffe60f8b5bdcc54e3187510a9971f3e8c88ce7a989f96114

                                    SHA512

                                    cf399fea01bae93a20f3e6735d455504eeec5d7dd327db9ab840cbf836d3da76b102dd2200bafb3db927ad6965219bba652e1de368676b02e113e7e0c8c57c9b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    5235ac11f896c25c1b3fbfb34fc8eb3a

                                    SHA1

                                    abe7725d823f6b280ecccb0b0a9f7baaf38ecb4d

                                    SHA256

                                    e7255e034b452a26db5ffa8cf5586ef5b7edd8d7e036c2306fc45aa291ba23b7

                                    SHA512

                                    6c53a3bb1d739179e101310ace8da72eff07b9eb262d08b9e0c409968fdb591dada598bff288cecabc3eb592cb529962cbafc77d8455477ad23833330e706edf

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                    Filesize

                                    1KB

                                    MD5

                                    57a1fe2a78492ccdda5a53adf19ad131

                                    SHA1

                                    9090de4706b7c4b5c78c64866d3c7528c6cd1a45

                                    SHA256

                                    83a727e193028db81ca9be5b3aef5270c9db1e2427d49c51f7624f45784abe75

                                    SHA512

                                    b759f9a7eade4aba4383b6850d966a97cb02d88da821e561e46f2f1f4b014a2c666c4ee4b20f61e159457f564e3f49a246b1903a1c7b81338a7c0d568b07455c

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57f81b.TMP

                                    Filesize

                                    1KB

                                    MD5

                                    95efd36472407eb3e2b47c297f0250b4

                                    SHA1

                                    022427659c043846ed475a43d53a00b2fefbe5b4

                                    SHA256

                                    10bec0b7e2218185ce8c6cf9eab297b29d50f759be29f6df3f3a397c4258d68d

                                    SHA512

                                    4fb77e98be073f31164a83f1369d6d63fbaf5faccc3ad98ac21b2b9d94783523c1b39918d202684d298f858222015185e538929d99967bf9bd2d582366fd0580

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    206702161f94c5cd39fadd03f4014d98

                                    SHA1

                                    bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                    SHA256

                                    1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                    SHA512

                                    0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    94f335cfff83c8a032df5519da9ee545

                                    SHA1

                                    1c13a338650b65b44e8ad6f61292785c959bdac9

                                    SHA256

                                    12f4744155e37ca581eea2783d8a47d75697508c5341361d76603be1ddccab79

                                    SHA512

                                    26dfea72b78b235bc422daa12b25e8780d8f1c3e0e85655233c062bb16c3e8bb45aab13005c817494fe7c0990912d796bb074345871063856ca4035b38376c45

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    11KB

                                    MD5

                                    fc10ad87205a9e3add16f8bcb66eb743

                                    SHA1

                                    4f448661e6007ddabcf241242d37158e6215bbfb

                                    SHA256

                                    2717f8749a6f3d1dc9723e4f7cce9e1001d903489874a4d1f3cce7b822adde55

                                    SHA512

                                    507fca8ccf0c9d1c3f50645df145df67793975f06d7178f39f78fd90303eea95e85fd263aee4893bae8c0469061a49275e08cc707cbf5f0dcc3fc089c5e7a885

                                  • C:\Users\Admin\Downloads\Discord-Account-Generator-main.zip

                                    Filesize

                                    30KB

                                    MD5

                                    511362586d9aba19d383f896dde752df

                                    SHA1

                                    1a34f7708f083dea2c36e7ce46d0d7297f8c9d86

                                    SHA256

                                    073a3a554da262e3ffaced7bc3940c5ae2024cb0f457fe539df980326ac6acc2

                                    SHA512

                                    27147c22afba73a9027c52a840e5861452f11b65362a0fbe0f58df10f80c16d6d691f847a54c61384dc0c0371ef9b8988521271ea97e72e1c841041ec6d78a2e

                                  • \??\pipe\LOCAL\crashpad_1412_ZLZIIDHMSHFEZZSZ

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/4720-216-0x0000016DF07E0000-0x0000016DF09A2000-memory.dmp

                                    Filesize

                                    1.8MB

                                  • memory/4720-215-0x0000016DD62A0000-0x0000016DD62B8000-memory.dmp

                                    Filesize

                                    96KB

                                  • memory/4720-226-0x0000016DF1020000-0x0000016DF1548000-memory.dmp

                                    Filesize

                                    5.2MB