Analysis
-
max time kernel
599s -
max time network
589s -
platform
windows10-1703_x64 -
resource
win10-20240404-de -
resource tags
arch:x64arch:x86image:win10-20240404-delocale:de-deos:windows10-1703-x64systemwindows -
submitted
13-08-2024 16:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1268224114980814939/1269728893326069900/RC7.zip?ex=66b11eae&is=66afcd2e&hm=31cfe103de0f3026ac788fde58ffb91b212f19cb19e4b18c4bd5665082773889&
Resource
win10-20240404-de
General
-
Target
https://cdn.discordapp.com/attachments/1268224114980814939/1269728893326069900/RC7.zip?ex=66b11eae&is=66afcd2e&hm=31cfe103de0f3026ac788fde58ffb91b212f19cb19e4b18c4bd5665082773889&
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133680414365471298" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 2836 chrome.exe 2836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe Token: SeShutdownPrivilege 1932 chrome.exe Token: SeCreatePagefilePrivilege 1932 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe 1932 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 4584 1932 chrome.exe 73 PID 1932 wrote to memory of 4584 1932 chrome.exe 73 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4720 1932 chrome.exe 75 PID 1932 wrote to memory of 4352 1932 chrome.exe 76 PID 1932 wrote to memory of 4352 1932 chrome.exe 76 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77 PID 1932 wrote to memory of 500 1932 chrome.exe 77
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1268224114980814939/1269728893326069900/RC7.zip?ex=66b11eae&is=66afcd2e&hm=31cfe103de0f3026ac788fde58ffb91b212f19cb19e4b18c4bd5665082773889&1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffa09e59758,0x7ffa09e59768,0x7ffa09e597782⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1556 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:22⤵PID:4720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:82⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2104 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:82⤵PID:500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2832 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:12⤵PID:4148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2840 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:12⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4844 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:82⤵PID:660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:82⤵PID:668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2384 --field-trial-handle=1816,i,11268474827372138562,6834478280437776554,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:4228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
935B
MD585e44c8c27b3c4c83adad3f3557da207
SHA187483e654b849d742d75b171783187fd924f7f10
SHA2562dccf4bcadf47276901079527875379fbe695fc93a3189865fdc4ced9503f49d
SHA512565583a81c7dbba287e11f30d99568c5d1a13a723f1998ac30254c8e9de62f29e874a2fde59046f9dfac7e37f3e065de7cb57261a3d9e8a0c5492681066ff745
-
Filesize
935B
MD5bb873f53e5aac5134c5a54d69ffc28a5
SHA1938954e9c9339fc5b71551eec5ef41c5903d09f2
SHA25616daa00dffaf35a36c0fd53b4354d951fddd1306048dd4b2202b2dfa0f953000
SHA512fc4f151e352c3f6a6771ad9ec9edf08c3bd88ac6cab79bd668fbc42974d4f59f3aea2f1aa5ea42e5eaa24b109c55c92a12d0415c0d474a1ef364ab0e7bb1adf5
-
Filesize
6KB
MD522a5cf793f3594c6438a9e49a4ca3a89
SHA1d22cfa4c69345f448d23364534690c1e7afd4814
SHA256a8d1d076685f9555e532de8c2e2a37f41f81b0b1410811fb1b032e5853399640
SHA512fb6d93b44d9ea65679d687ebf72af8a236b84ec6e293e12aeb466802885848ab8c8f46a86473e77b41e3bb365fb1f352143e3d91f4e59288c9feeec0f14f2bc8
-
Filesize
6KB
MD5fe66a62687e61883bce501dec8b3f53d
SHA1872ea3559dd04aef263d167464e2f3e11c9c7c60
SHA256a077dd7586e12bbd192266a422dda1d1dda20a75ea1edb7b1ef7d130ed30bc34
SHA512201af2d9d62288ac8d3b50f3cf53440988c80c3e801ca2603eb5f3ee36e43be8ec57b5b9b1a5fe864a3a67b2f6eb7cf9d4a87ebc22261658dc8e425de439f786
-
Filesize
6KB
MD5dff139b469b77d483566df212a3f9651
SHA13580f57d1138094ffe537ad9d0ea7c8524153f7b
SHA25635416295ce5d86592e14d113b4cf866d72eab011080aeea8ff7db956dfa0f1ce
SHA512dd3620102645c5952c6b887f6f20c21932a0a6540826f4640b0c58e6b98f576b15cf8279b22095cc91fa8cc2846470dd371948237f9efb999558bb354392bf07
-
Filesize
136KB
MD5c78d6712bbe15a2566dc684ff1dba5cf
SHA1f0f3fe209ae62ebb5bbe18c0d920ec0856e50d5e
SHA25669e7ec1c605294e9f077fdf8b0d30299c663473fe87033a8ae1ce405a4e49ea1
SHA512113b4d8ca8d51e21e26ae243d63b260fae85124c63d44aba77528427125e62d6d999930f49f455d5385ebe0285df0c423a5b12857629fd444f517bb86a92882f
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd