Analysis Overview
SHA256
ab729e0863a50f12c74f4a9b73e5127b60eab312497e973c035634f32d04e048
Threat Level: Known bad
The file multitool.rar was found to be: Known bad.
Malicious Activity Summary
Discordrat family
Discord RAT
Legitimate hosting services abused for malware hosting/C2
Drops file in Program Files directory
Unsigned PE
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Program crash
Modifies Internet Explorer settings
Suspicious use of WriteProcessMemory
Checks processor information in registry
Suspicious use of FindShellTrayWindow
Enumerates system info in registry
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2025-01-01 20:48
Signatures
Discordrat family
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral2
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeBackupPrivilege | N/A | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2000 wrote to memory of 5020 | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\FastVisits.exe | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe |
| PID 2000 wrote to memory of 5020 | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\FastVisits.exe | C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\multitool\files\FastVisits.exe
"C:\Users\Admin\AppData\Local\Temp\multitool\files\FastVisits.exe"
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
dw20.exe -x -s 1156
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 140.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 220.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 208.143.182.52.in-addr.arpa | udp |
Files
memory/2000-0-0x00007FF849AE5000-0x00007FF849AE6000-memory.dmp
memory/2000-1-0x000000001C020000-0x000000001C4EE000-memory.dmp
memory/2000-2-0x00007FF849830000-0x00007FF84A1D1000-memory.dmp
memory/2000-3-0x000000001C4F0000-0x000000001C58C000-memory.dmp
memory/2000-4-0x00007FF849830000-0x00007FF84A1D1000-memory.dmp
memory/2000-5-0x00000000012E0000-0x00000000012E8000-memory.dmp
memory/2000-6-0x00007FF849830000-0x00007FF84A1D1000-memory.dmp
memory/2000-7-0x00007FF849830000-0x00007FF84A1D1000-memory.dmp
memory/2000-8-0x00007FF849AE5000-0x00007FF849AE6000-memory.dmp
memory/2000-9-0x00007FF849830000-0x00007FF84A1D1000-memory.dmp
memory/2000-16-0x00007FF849830000-0x00007FF84A1D1000-memory.dmp
Analysis: behavioral4
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
92s
Max time network
141s
Command Line
Signatures
Discord RAT
Discordrat family
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\Release\Discord rat.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\multitool\files\Release\Discord rat.exe
"C:\Users\Admin\AppData\Local\Temp\multitool\files\Release\Discord rat.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | gateway.discord.gg | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 162.159.134.234:443 | gateway.discord.gg | tcp |
| US | 8.8.8.8:53 | 234.134.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 220.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
memory/2428-0-0x00007FFD55DD3000-0x00007FFD55DD5000-memory.dmp
memory/2428-1-0x000001F695150000-0x000001F695168000-memory.dmp
memory/2428-2-0x000001F6AF6D0000-0x000001F6AF892000-memory.dmp
memory/2428-3-0x00007FFD55DD0000-0x00007FFD56891000-memory.dmp
memory/2428-4-0x000001F6AFF10000-0x000001F6B0438000-memory.dmp
memory/2428-5-0x00007FFD55DD0000-0x00007FFD56891000-memory.dmp
Analysis: behavioral6
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
147s
Max time network
150s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe
"C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
Files
memory/1868-0-0x00000000747EE000-0x00000000747EF000-memory.dmp
memory/1868-1-0x0000000000C30000-0x0000000000C38000-memory.dmp
memory/1868-2-0x0000000005C80000-0x0000000006224000-memory.dmp
memory/1868-3-0x00000000056D0000-0x0000000005762000-memory.dmp
memory/1868-4-0x0000000005640000-0x000000000564A000-memory.dmp
memory/1868-5-0x00000000747E0000-0x0000000074F90000-memory.dmp
memory/1868-6-0x00000000747EE000-0x00000000747EF000-memory.dmp
memory/1868-7-0x00000000747E0000-0x0000000074F90000-memory.dmp
Analysis: behavioral7
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
151s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\multitool\files\dnlib.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 215.143.182.52.in-addr.arpa | udp |
Files
Analysis: behavioral8
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
152s
Command Line
Signatures
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | pastebin.com | N/A | N/A |
| N/A | pastebin.com | N/A | N/A |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files\Win64 | C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe
"C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | pastebin.com | udp |
| US | 104.20.3.235:443 | pastebin.com | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 235.3.20.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 90.16.208.104.in-addr.arpa | udp |
Files
memory/4076-0-0x000000007468E000-0x000000007468F000-memory.dmp
memory/4076-1-0x0000000000270000-0x0000000000FE2000-memory.dmp
memory/4076-2-0x0000000005E90000-0x0000000006434000-memory.dmp
memory/4076-3-0x00000000059D0000-0x0000000005A62000-memory.dmp
memory/4076-4-0x0000000005C70000-0x0000000005DBE000-memory.dmp
memory/4076-5-0x0000000074680000-0x0000000074E30000-memory.dmp
memory/4076-6-0x0000000005DD0000-0x0000000005DDA000-memory.dmp
memory/4076-7-0x0000000005E80000-0x0000000005E94000-memory.dmp
memory/4076-8-0x0000000074680000-0x0000000074E30000-memory.dmp
memory/4076-9-0x000000007468E000-0x000000007468F000-memory.dmp
memory/4076-10-0x0000000074680000-0x0000000074E30000-memory.dmp
memory/4076-11-0x0000000074680000-0x0000000074E30000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
133s
Max time network
139s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\multitool\files\LeanWoofer (Unpacked).exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\multitool\files\LeanWoofer (Unpacked).exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\multitool\files\LeanWoofer (Unpacked).exe
"C:\Users\Admin\AppData\Local\Temp\multitool\files\LeanWoofer (Unpacked).exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3520 -ip 3520
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 884
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.219.191.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 21.236.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 90.16.208.104.in-addr.arpa | udp |
Files
memory/3520-0-0x0000000074C8E000-0x0000000074C8F000-memory.dmp
memory/3520-1-0x00000000004A0000-0x0000000001264000-memory.dmp
memory/3520-2-0x00000000061A0000-0x0000000006744000-memory.dmp
memory/3520-3-0x0000000005C90000-0x0000000005D22000-memory.dmp
Analysis: behavioral5
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
92s
Max time network
145s
Command Line
Signatures
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\multitool\files\Siticone.UI.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 154.239.44.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 220.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral9
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4680 wrote to memory of 2956 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\system32\chcp.com |
| PID 4680 wrote to memory of 2956 | N/A | C:\Windows\system32\cmd.exe | C:\Windows\system32\chcp.com |
| PID 4680 wrote to memory of 1728 | N/A | C:\Windows\system32\cmd.exe | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe |
| PID 4680 wrote to memory of 1728 | N/A | C:\Windows\system32\cmd.exe | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe |
| PID 4680 wrote to memory of 1728 | N/A | C:\Windows\system32\cmd.exe | C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe |
Processes
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\multitool\main.bat"
C:\Windows\system32\chcp.com
chcp 65001
C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exe
builder.exe
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 75.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 81.144.22.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 104.193.132.51.in-addr.arpa | udp |
Files
memory/1728-0-0x00000000751AE000-0x00000000751AF000-memory.dmp
memory/1728-1-0x0000000000420000-0x0000000000428000-memory.dmp
memory/1728-2-0x0000000005380000-0x0000000005924000-memory.dmp
memory/1728-3-0x0000000004E70000-0x0000000004F02000-memory.dmp
memory/1728-4-0x0000000004E30000-0x0000000004E3A000-memory.dmp
memory/1728-5-0x00000000751A0000-0x0000000075950000-memory.dmp
memory/1728-7-0x00000000751A0000-0x0000000075950000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2025-01-01 20:48
Reported
2025-01-01 20:52
Platform
win10v2004-20241007-en
Max time kernel
103s
Max time network
149s
Command Line
Signatures
Enumerates physical storage devices
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Microsoft\Internet Explorer\IESettingSync | C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" | C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe
"C:\Users\Admin\AppData\Local\Temp\multitool\files\DDOS.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | counter3.contadorvisitasgratis.com | udp |
| US | 8.8.8.8:53 | drhibithack.blogspot.com | udp |
| FR | 37.187.129.45:80 | counter3.contadorvisitasgratis.com | tcp |
| FR | 216.58.213.65:80 | drhibithack.blogspot.com | tcp |
| FR | 216.58.213.65:80 | drhibithack.blogspot.com | tcp |
| US | 8.8.8.8:53 | www.blogger.com | udp |
| FR | 216.58.214.169:443 | www.blogger.com | tcp |
| FR | 216.58.214.169:443 | www.blogger.com | tcp |
| US | 8.8.8.8:53 | 138.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 45.129.187.37.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 65.213.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | c.pki.goog | udp |
| FR | 142.250.179.67:80 | c.pki.goog | tcp |
| US | 8.8.8.8:53 | o.pki.goog | udp |
| FR | 142.250.179.67:80 | o.pki.goog | tcp |
| US | 8.8.8.8:53 | 169.214.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.150.49.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.190.18.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 73.144.22.2.in-addr.arpa | udp |
Files
memory/1736-0-0x00007FFC2E745000-0x00007FFC2E746000-memory.dmp
memory/1736-1-0x000000001BF10000-0x000000001BFB6000-memory.dmp
memory/1736-3-0x000000001C4A0000-0x000000001C96E000-memory.dmp
memory/1736-2-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-4-0x000000001CA20000-0x000000001CABC000-memory.dmp
memory/1736-5-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-6-0x00000000017B0000-0x00000000017B8000-memory.dmp
memory/1736-7-0x000000001CB80000-0x000000001CBCC000-memory.dmp
memory/1736-8-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-9-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-10-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-11-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-12-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp
memory/1736-28-0x00007FFC2E745000-0x00007FFC2E746000-memory.dmp
memory/1736-29-0x00007FFC2E490000-0x00007FFC2EE31000-memory.dmp