Analysis
-
max time kernel
78s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-08-2024 18:16
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://discord.gg/mamarre
Resource
win7-20240708-en
General
-
Target
http://discord.gg/mamarre
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 13 discord.com 14 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe Token: SeShutdownPrivilege 1676 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe 1676 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1676 wrote to memory of 2084 1676 chrome.exe 30 PID 1676 wrote to memory of 2084 1676 chrome.exe 30 PID 1676 wrote to memory of 2084 1676 chrome.exe 30 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2992 1676 chrome.exe 32 PID 1676 wrote to memory of 2840 1676 chrome.exe 33 PID 1676 wrote to memory of 2840 1676 chrome.exe 33 PID 1676 wrote to memory of 2840 1676 chrome.exe 33 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34 PID 1676 wrote to memory of 2964 1676 chrome.exe 34
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument http://discord.gg/mamarre1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7f99758,0x7fef7f99768,0x7fef7f997782⤵PID:2084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1148 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:22⤵PID:2992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:82⤵PID:2840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1520 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:82⤵PID:2964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2216 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:12⤵PID:1732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2224 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:12⤵PID:1640
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1448 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:22⤵PID:2160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3188 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:12⤵PID:1872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3620 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:82⤵PID:1300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3604 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3508 --field-trial-handle=1352,i,17268040180611522141,979629367616055995,131072 /prefetch:12⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\27d9f5a0-6797-44ac-92e7-79293b8b4daa.tmp
Filesize5KB
MD5bc14de5143bc6753a4cdbe762249b528
SHA1da95bb2da65fc4764d1e758df5300f10fd381c1b
SHA2569809d104aa5e4644c046fab06137350a839dfe73bfdf3d9ebccde5ee7c35c610
SHA51227e74b4c7154bd3369dfc641de17ed85020290a443d853575cabf5f8b21c3c5ba58e3f44f4c0107d5e63bedc4f8d2f29e3a5cacb25f31b80f701b502ace9cb6a
-
Filesize
576B
MD51b886e6f89d437ee9486e90a16e08b5a
SHA194d101c0078d06f5b9b5e44f56a44044b030e3b5
SHA25658c31c5179f1c9d5d1f2b4ced57096edd5ede2cc867e14c95ad3021b768f94ec
SHA5120372c75507e3449c0ba79e0e6338920246acf1cb35663fd2af75cb4bc52085bdb27dc0f4e1effdc635964dc40875a688fe7036463492dc679474e1e20e08d97e
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD59c12c685fe761de460d2d5007acf606e
SHA155ff14013bdb4f06b3abdd4be186ecebcc5cdb17
SHA25688cccd32c03fc7e7b5facec7c45b2fa1e409be7c7cef7f8f2b464ebe2455092d
SHA512d56e12eb2608d8d95905a34d29c68f5b128c72bc2077a0fb00399b4ced3e6eb567543b8a581f8f126748a7e3b4d0077e57040fe41f3b9db49a4b36c02f8eb49a
-
Filesize
689B
MD5187508f59ae1558056dddfb0af3beca7
SHA12f36ab03855aea7e120b96da75de636388a75a22
SHA256cdddf0a5cbde7b216dabcf1f7970f69f65a3b5f2f0ed9d74f2f5d8f0dd8d4d35
SHA512e1f7c4f1fdb33ed14dd70cc30b1757dfd1b7b5ec63a61962089fa8043ab1ce0d8cac20d2a4c740093a5568f37d1d7af4af7aa3f392ad865ecfd3f39edf65e1c3
-
Filesize
1KB
MD50a6df4adbec405512044989a5f613f1e
SHA11447ca28654d7a80df4988836fe009ae5ea136f3
SHA2569d017563c585fdd4d5d3681d920375c86ad5bd5912c2b2e835e365ba85aac3d1
SHA5124e4948625287722dca4e1c82112f1c6cd3d50ef787158755b0c6c41204461db4ad4f4a0a7329c9e833598a3a5d417513f7cd08980729f4bf0b902bbaba165344
-
Filesize
1KB
MD5e691e06154da617ab6ad287af44f2747
SHA1df47eaaed488ea7daba2600673352b5cab59409e
SHA2569745b0f973028dcd780a87ce110a0ea86e9e0a2ee275f5313ac29dd5b1ebeb86
SHA512121bfe801004b9eb6fce4e1b261d32d64c525bcb7dec25296310c57a78d4834751098d8e24990044e3880a34de1e38b7ee43fd844273e949afbaa3b52944d079
-
Filesize
5KB
MD5742104c8a71b3af9e8e28aa07630b0e5
SHA1d70cf7937edfd8457d27e3d702bf0fd0744ed770
SHA256b2b7d5dc12cdf1149b6f9bbaf909146291f98125d51ef50f5b2d1d8caba68962
SHA512e3d6f632348d513754541cafefdbdcbbac37bad8a8f69b56f31c0e12cb946d66b1b8a566ff71d495bdc906439018310b7866cc142bb1c2ac952a5fdea894329f
-
Filesize
4KB
MD595cac7019b916d4fafa260ebe0f6b8d5
SHA1cc903b6f79eee35b795a0ab04f94b10fea0119a7
SHA25600d72a8cd1c475549a58ba2176a185f8261cdd056169e91dadb64dc98205188a
SHA5129e7a1a9d9b4f3b1434b4ae85c2a1be02e5d6457edd9ae715dcbb73828694660e3768599576c82a50983e7895c817397b4f84601ed3bc49bcd2cff304eb45d259
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b