Analysis
-
max time kernel
106s -
max time network
286s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 19:13
Behavioral task
behavioral1
Sample
discordratclient.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
discordratclient.exe
Resource
win10v2004-20240802-en
General
-
Target
discordratclient.exe
-
Size
78KB
-
MD5
968fd8c1b9fbbe9345e4c14357ab015f
-
SHA1
22d4f725fea9cc804a094132edbbb472326ffaa3
-
SHA256
08bd10bde0879c2bc0f72a4f1be106237b3e15dae52897454fa69bd036cecb05
-
SHA512
fb7f220e25c9dd22922ddd578a961c8144d08097f6575b075d8f6b66146da55959e34e332dec4ff64e987cddf909ff5c6c9a54c9b802a8690224edce930d3d25
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+/PIC:5Zv5PDwbjNrmAE+HIC
Malware Config
Extracted
discordrat
-
discord_token
MTI4NTU4ODM5MDc1ODE5MTIzNQ.GwW9id.kiyuRUJzPrMsV4YY0PXjxpwWhqeWLNrB1F_Voo
-
server_id
1285585473472958475
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe Token: SeShutdownPrivilege 2880 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe 2880 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2896 wrote to memory of 1992 2896 discordratclient.exe 30 PID 2896 wrote to memory of 1992 2896 discordratclient.exe 30 PID 2896 wrote to memory of 1992 2896 discordratclient.exe 30 PID 2880 wrote to memory of 2760 2880 chrome.exe 32 PID 2880 wrote to memory of 2760 2880 chrome.exe 32 PID 2880 wrote to memory of 2760 2880 chrome.exe 32 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 1764 2880 chrome.exe 34 PID 2880 wrote to memory of 2784 2880 chrome.exe 35 PID 2880 wrote to memory of 2784 2880 chrome.exe 35 PID 2880 wrote to memory of 2784 2880 chrome.exe 35 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36 PID 2880 wrote to memory of 2944 2880 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\discordratclient.exe"C:\Users\Admin\AppData\Local\Temp\discordratclient.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2896 -s 5962⤵PID:1992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7fe9758,0x7fef7fe9768,0x7fef7fe97782⤵PID:2760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1140 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:22⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1388 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1476 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:82⤵PID:2944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1456 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:12⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:12⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1976 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:22⤵PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1888 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:12⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3640 --field-trial-handle=1808,i,831159229003658877,13455823938875363489,131072 /prefetch:82⤵PID:1464
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
632B
MD58ef65b3c8d2f484d328c35f912762fbc
SHA1e48590561a2892d6bee32a78d92680a701ebee11
SHA256ba6d2cfd276d8fc9c91b75eff3b76c1904dce5dcc2ad9cd1b539e386557dd8c0
SHA51201ead794f39700b4d0c3e861122f2e5938ed28cfb5798af70413cbfab235e30da1b947146d08b771b7490b6f03fe45853b6e23e1d5fdaa0c7b55b69834dccda5
-
Filesize
828B
MD51a290b5d178d7e1264bf020a13955ea2
SHA19e4eaa82d563c58f8a1fff5d5f1b074f2cf2a8fc
SHA25663718ef359e89b9bcd666b9300fc7653057b9963449e1c10bf5e07dd28925b27
SHA512e6eb3270e493e2ea772035576bf42b97e87ec65af0d598fa593638e29c09c87b4c52b8eec5ded9d740da450fd0be4f8222dcbfc0c5809fa260b9204493afd5b6
-
Filesize
5KB
MD54e16c2aaa6ad5b85c152ef6e8407097f
SHA154c863b0744ebe6a123fc18709b22962faa2bbfc
SHA256a1159431839c06bf8ade4bff6af2a928411ba939b0a3576ff5b82585771771ca
SHA5128ef2f1f202fb3e093ea61361f7355a39ccb95412ea7cd798f1051f4b8c1b39cfecc26062a7956c205e665b5b595a45fc23998239aed86e7dc4e7754bc0651633
-
Filesize
5KB
MD5c9a268cb6e42743d0e602a1c2fbb0637
SHA1c847a7cf0a05fa8a0829ae580b1cce3d6f0cc3e2
SHA25613ea34962321ccadbbc7ae7deb64022eb561b102d0dee9f8df1e2673a0bcb77c
SHA5126677e4f6494c678c9bea52347d5c4d413637a8e0681cececbf62743ac2d212c3efd91711a2186d13cef6fa17e56e92660db20c1a58a8d730155c343c7ff8d5be
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2