Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 21:27
Behavioral task
behavioral1
Sample
Moon cheats.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Moon cheats.exe
Resource
win10v2004-20241007-en
General
-
Target
Moon cheats.exe
-
Size
78KB
-
MD5
38e4b7ff4a920761992ca63ebcd26e00
-
SHA1
52802365d5d322f32650c442b9ab8dd9e83e781a
-
SHA256
c04d8e594bbf9f43d9eb4258ca841223723acba5d589bbb930075e548c50a68b
-
SHA512
7643e6b1d0e9bc35d98a8f678d384bec993e92daa822a725264b2977fcf8f7b01d4f290227e3479d075ec4f7ce908e3b4833501c71e9655306ad52617326ae10
-
SSDEEP
1536:P2WjO8XeEXFV5P7v88wbjNrfxCXhRoKV6+V+BPIC:PZ75PDwbjNrmAE+RIC
Malware Config
Extracted
discordrat
-
discord_token
MTMxMTU0ODcwMzk2NTg0MzUxNg.GPuVA3.CyklsGzX37HNAn2aXN3K0s0SNEGALNOLa1qq7A
-
server_id
1311541606738038905
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid Process 2680 chrome.exe 2680 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe Token: SeShutdownPrivilege 2680 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
Processes:
chrome.exepid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of SendNotifyMessage 48 IoCs
Processes:
chrome.exepid Process 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe 2680 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
Moon cheats.exechrome.exedescription pid Process procid_target PID 1120 wrote to memory of 2068 1120 Moon cheats.exe 28 PID 1120 wrote to memory of 2068 1120 Moon cheats.exe 28 PID 1120 wrote to memory of 2068 1120 Moon cheats.exe 28 PID 2680 wrote to memory of 2500 2680 chrome.exe 32 PID 2680 wrote to memory of 2500 2680 chrome.exe 32 PID 2680 wrote to memory of 2500 2680 chrome.exe 32 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 2152 2680 chrome.exe 34 PID 2680 wrote to memory of 1440 2680 chrome.exe 35 PID 2680 wrote to memory of 1440 2680 chrome.exe 35 PID 2680 wrote to memory of 1440 2680 chrome.exe 35 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36 PID 2680 wrote to memory of 592 2680 chrome.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Moon cheats.exe"C:\Users\Admin\AppData\Local\Temp\Moon cheats.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1120 -s 6002⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6da9758,0x7fef6da9768,0x7fef6da97782⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:22⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1436 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:82⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:82⤵PID:592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:12⤵PID:1104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2332 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:12⤵PID:844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2844 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:22⤵PID:2936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1548 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:12⤵PID:1912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 --field-trial-handle=1372,i,13131817068563233855,13473939157669564696,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD528b5dec35a0e688890e7ec5ee57fe36d
SHA11e77fc06f146d10249a842c3f0b8564261dee374
SHA256c728dffb050745e97d7c84a7b0e5a1ac89d5f10d0249f86c07698e89c5891d76
SHA512699cafc6cdd37f257f84520fe6ae1e090fef555aff10efe02b4665450aff9d087932b59b763310db0365a7b7b545fe1452a5dd3876f5503a3733b2b5e32e484d
-
Filesize
5KB
MD58cf101e6d5c3cfaed71e610c79106c07
SHA128d2acd53bbbe0a9ce664ab8de9e93cbd0443ec1
SHA2562a694907a86af436e7504773bab64e3c7c584cfe2b62c33a0ab551efaff62621
SHA5120c5bda5ee5542d0e762d6b1e42ead916bf51e06598eb92c253b981f306b2bed18b7f49f018b6279f033e725ce12a7d8a818021ed0c0acc9f86794a26908f2bee
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e