Analysis
-
max time kernel
22s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 06:40
Static task
static1
Behavioral task
behavioral1
Sample
160107100400-monkey-selfie.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
160107100400-monkey-selfie.exe
Resource
win10v2004-20240802-en
General
-
Target
160107100400-monkey-selfie.exe
-
Size
1.2MB
-
MD5
a4880b8dead5dd953df4c7e3f1afef44
-
SHA1
e9a098cf38d19999153b7a13e13dce9d80ba311f
-
SHA256
f22d8d5aac00f66414ca8b74b0c023f8adbef57698e9b64532d6fdaa1b41693b
-
SHA512
6b46d687b2a96c36580a5993cb1585a77f61cc42da459aef8665220b2c77f5e9934bb659c1bd909e36cbcb7e4399904a09fe2819e2ed9da068fd99286eca0177
-
SSDEEP
24576:YuDXTIGaPhEYzUzA0L/bfvbdlgNM2FsNCPq0MH9KI:XDjlabwz9rgOtLoI
Malware Config
Extracted
discordrat
-
discord_token
MTIwNTMzOTUzNjEwMDY5NjA3NA.GE6gMg.mfWLL6-p2ZTIG_q9R9EM57japDdbe-TVG83A5E
-
server_id
1205339412481704017
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 1 IoCs
pid Process 2608 SHELLSHOCK V4 BETA.exe -
Loads dropped DLL 6 IoCs
pid Process 2008 160107100400-monkey-selfie.exe 1372 WerFault.exe 1372 WerFault.exe 1372 WerFault.exe 1372 WerFault.exe 1372 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 752 chrome.exe 752 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe Token: SeShutdownPrivilege 752 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe 752 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2608 2008 160107100400-monkey-selfie.exe 31 PID 2008 wrote to memory of 2608 2008 160107100400-monkey-selfie.exe 31 PID 2008 wrote to memory of 2608 2008 160107100400-monkey-selfie.exe 31 PID 2608 wrote to memory of 1372 2608 SHELLSHOCK V4 BETA.exe 32 PID 2608 wrote to memory of 1372 2608 SHELLSHOCK V4 BETA.exe 32 PID 2608 wrote to memory of 1372 2608 SHELLSHOCK V4 BETA.exe 32 PID 752 wrote to memory of 2808 752 chrome.exe 34 PID 752 wrote to memory of 2808 752 chrome.exe 34 PID 752 wrote to memory of 2808 752 chrome.exe 34 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 2928 752 chrome.exe 36 PID 752 wrote to memory of 868 752 chrome.exe 37 PID 752 wrote to memory of 868 752 chrome.exe 37 PID 752 wrote to memory of 868 752 chrome.exe 37 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38 PID 752 wrote to memory of 2768 752 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\160107100400-monkey-selfie.exe"C:\Users\Admin\AppData\Local\Temp\160107100400-monkey-selfie.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\SHELLSHOCK V4 BETA.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\SHELLSHOCK V4 BETA.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2608 -s 5963⤵
- Loads dropped DLL
PID:1372
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef73b9758,0x7fef73b9768,0x7fef73b97782⤵PID:2808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1092 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:22⤵PID:2928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:82⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1608 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:82⤵PID:2768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2244 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:12⤵PID:848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2272 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:12⤵PID:484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=3216 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:22⤵PID:1288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1320 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:12⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3652 --field-trial-handle=1368,i,11251506718342586804,5669960808424584854,131072 /prefetch:82⤵PID:1272
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5bfab1303f3d238532e111af4a2f141ff
SHA123542bf5818a4fca0c5bc8711d969b1fe749257e
SHA256cbd802efda68ae8419dcce72c3c26281fa44ba3fc7885d602660cdf3d547d31c
SHA512d7b5448b9f6d65a81229e2d46b16145f7e85231277ef617081d7e2930780fdd4ce0dc1d210d39e0772a6b7b3e2d20f5e5041d88c3ee767e05433b42c73880f8e
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
316KB
MD5320f4e643aca51e078daba9a80d5953c
SHA10b7750fbdc2c8f0dadd7b46f1af73e81f126180f
SHA256e60152ca3237d209b840086f35e41324f45cabeec6c9e3a40d247241df0329ef
SHA512553a90d55ab508aa3481046842dead5297d505b776ba5052166afd9f860a6ff870ce217b3df404b609ed892372cf05edc03c29c7f294cb2099ca222d11051348
-
Filesize
316KB
MD5713425bbbdaf26065afe31026a734d52
SHA1e5649b5c84a2931e9ef8598e7efda970250c0adc
SHA256e51f7bf5625c6d164c92169979e142e91eb98ce635b6d08d75f85af5037cff8c
SHA5122f4005640d292f66767db34c741111aa9f15a58f5c341b7deec18790a6e95cac7d02394e9b26cd549a4e86c4180dbffa9f9b3fbd9da603f06bc137da32e3dd56
-
Filesize
78KB
MD529d38362cbd41b5e1a5e59430703ceec
SHA18295e65a9b50f5e547cbee60d1824941dceb2390
SHA2565f66c734a143d42ceb199d3fde28309147c8d1f289397bb4c72e5788976c0874
SHA512bf53878035431a91ffcb87445fccd6b0623100acbff64219f6fb99cc38f0f59c77a5df25cee119cbeb47350b49b1ce1e187d5be287beca90e0c9652abd389a70