Overview
overview
6Static
static
1discord-bo...er.zip
windows10-2004-x64
1discord-bo...ignore
windows10-2004-x64
3discord-bo...NG.yml
windows10-2004-x64
3discord-bo...oad.js
windows10-2004-x64
3discord-bo...g.yaml
windows10-2004-x64
3discord-bo...dex.js
windows10-2004-x64
3discord-bo...e.json
windows10-2004-x64
3extension.zip
windows10-2004-x64
1popup.html
windows10-2004-x64
3script.js
windows10-2004-x64
3discord-bo...p.html
windows10-2004-x64
3discord-bo...ipt.js
windows10-2004-x64
3discord-bo...x.html
windows10-2004-x64
6discord-bo...dex.js
windows10-2004-x64
3Analysis
-
max time kernel
1680s -
max time network
1686s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
discord-bot-client-master.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
discord-bot-client-master/.dockerignore
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
discord-bot-client-master/.github/FUNDING.yml
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
discord-bot-client-master/download.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
discord-bot-client-master/electron/dist/builder-effective-config.yaml
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
discord-bot-client-master/electron/index.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
discord-bot-client-master/electron/package.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
extension.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
popup.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
script.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
discord-bot-client-master/extension/popup.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
discord-bot-client-master/extension/script.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
discord-bot-client-master/index.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
discord-bot-client-master/index.js
Resource
win10v2004-20241007-en
General
-
Target
popup.html
-
Size
164B
-
MD5
f773e0e5a09a22c412ce26fb6e396e6c
-
SHA1
ea83b9562f899318ec68e7ea5870251842fbf2da
-
SHA256
768707ff640ff810471b54dc014b58042b3a3983d235edbda462cf4487eea6a7
-
SHA512
35615bfa9dc5a5a86aa08931ee8b05a067979f5aedc690e8c76473a172ff95503d3fb8fed378da7ebe7197885470662881546857df752f3f885799163953b5e4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4376 msedge.exe 4376 msedge.exe 2724 msedge.exe 2724 msedge.exe 220 identity_helper.exe 220 identity_helper.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe 2724 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 4556 2724 msedge.exe 84 PID 2724 wrote to memory of 4556 2724 msedge.exe 84 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4880 2724 msedge.exe 85 PID 2724 wrote to memory of 4376 2724 msedge.exe 86 PID 2724 wrote to memory of 4376 2724 msedge.exe 86 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87 PID 2724 wrote to memory of 1924 2724 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\popup.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb596c46f8,0x7ffb596c4708,0x7ffb596c47182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,1136907466693006934,9566228204635103126,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
5KB
MD5427d3cd17eadbac8bf6841135983a664
SHA139597b8dfbc6b58e07b801b08c8999c629855e74
SHA256cb6cab9782ee1403de7e785aa26a740017ef51b256d04309c17d0cbb83ef4836
SHA51240742055b12899faccba447f4e0858922b96e65611010558d1ea52c045a0f5ada2a0cb2fc296ffa3f73bf608be31efeb8c7c6d943d63aaf71dce4ba4d6f0adb8
-
Filesize
6KB
MD57b7473b51831c1a521a688f164658246
SHA1255e3a50ff474e9db389b05c635a9d7811ec14d4
SHA256438743d20733bec7db7174ca802d1c713709e007ad61df5181c7f62c8b93f5ed
SHA51262f6af4de03af5eb0bd103db84cce9ef09615494cab691d8a39b6a52c827cd24ad72e542544c25445061c4323d43003d44bbdb7b57b281f6a8e642adf6ec82ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c475b01a6fcdf3423e83cdc4ea891149
SHA1fa798e517b40573ccb148812033a74efb36a04c9
SHA256f04ddba39888f25aea5d2b827abf8182365f62fd35ffd594961f0cb3c2733d82
SHA512724fb5b026fbc5c03c40d47b60ae4efea6042dc1364706e67e5107b7bf73afc35f4162a4a995edd0e57d03461e0ae7a71b7b2281fe663cc855475a42ce5adba3