Resubmissions

05-01-2025 06:08

250105-gv4sysxjgm 10

04-01-2025 23:46

250104-3srw9svrel 10

Analysis

  • max time kernel
    41s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 06:08

General

  • Target

    Discord rat.exe

  • Size

    79KB

  • MD5

    d13905e018eb965ded2e28ba0ab257b5

  • SHA1

    6d7fe69566fddc69b33d698591c9a2c70d834858

  • SHA256

    2bd631c6665656673a923c13359b0dc211debc05b2885127e26b0dce808e2dec

  • SHA512

    b95bfdebef33ac72b6c21cdf0abb4961222b7efd17267cd7236e731dd0b6105ece28e784a95455f1ffc8a6dd1d580a467b07b3bd8cb2fb19e2111f1a864c97cb

  • SSDEEP

    1536:YCH0jBD2BKkwbPNrfxCXhRoKV6+V+y9viwp:VUjBD2BPwbPNrmAE+MqU

Malware Config

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Discordrat family
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 48 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Discord rat.exe
    "C:\Users\Admin\AppData\Local\Temp\Discord rat.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2064 -s 600
      2⤵
        PID:3044
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7319758,0x7fef7319768,0x7fef7319778
        2⤵
          PID:2392
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:2
          2⤵
            PID:2168
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:8
            2⤵
              PID:2804
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1592 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:8
              2⤵
                PID:2928
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2328 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:1
                2⤵
                  PID:2436
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:1
                  2⤵
                    PID:2028
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1536 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:2
                    2⤵
                      PID:2124
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1244 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:1
                      2⤵
                        PID:704
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:8
                        2⤵
                          PID:688
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3844 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:1
                          2⤵
                            PID:1796
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 --field-trial-handle=1364,i,18158381366241828513,4883685498792003667,131072 /prefetch:8
                            2⤵
                            • Modifies registry class
                            • Suspicious behavior: GetForegroundWindowSpam
                            • Suspicious use of SetWindowsHookEx
                            PID:1652
                        • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                          "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                          1⤵
                            PID:1504

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            deebb40d2b5484d62910bc33ecd50663

                            SHA1

                            9f4f259cca6b636cd06135d2f84dd4d2fe8b5d14

                            SHA256

                            498d52e66e9a714707f96521cf65f6550c0b7857e9f3301d4e6c3d898c63e87f

                            SHA512

                            f175568e8ec72d011d6f123e0de699ae6d1e9a1de49acf72357a930e1f504592e2db6c3f3fa04b39175437db86391955eb322aad63de79e9a993c6a79ae8b602

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            b3ae80efe138a6975636e16111cb843c

                            SHA1

                            79136c93e5eaf6e4e5c0a8c6f34834bc86ad8176

                            SHA256

                            71f4e0d8d0b68cbf842cf767792703c57846e53c2c0b3fcb695d47c5b21c57c6

                            SHA512

                            554e9df2ef93fa4744be635b678a1130cabb808934419ec9f42cb34b23b2849969dd5e4c2cc05f32f24224f99f35a49b60411c5cdaa7e901c266eb02d7ab4357

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            12714a7761780d3c01ec5871634ffd02

                            SHA1

                            acd9ff981053e14c569b0e0f72fac26a3d9e57ff

                            SHA256

                            5dbf7020696fbd8ad4af4330a78841d492b0aa166c29b922939c8c1cb7665e92

                            SHA512

                            a4797bb3c855ecb11c9cbb282907333dfa4d22e88d3c090c82f7628ebb5f06e3370bf095751172b65e6e5b71f72e7306081ae253808f0eec5c2fc743a27ee947

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                            Filesize

                            342B

                            MD5

                            ad0679732069cafb7f4fe9c6331c7bfa

                            SHA1

                            5a3cdf9b8825bd4e6513b225fd97791e8199db37

                            SHA256

                            d53169de01b897d8398df532723ebc7bac27bd124646935035baf7fc0a8c273b

                            SHA512

                            1827788bb346bb4be6dcdf14e14ed653b3aa8072962459a30d38ca349b8e1bfa906c0e42dde8e5330efb65d0b63f27d5b3a9a7d9681bed88caa7569eac0a9ad7

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                            Filesize

                            16B

                            MD5

                            aefd77f47fb84fae5ea194496b44c67a

                            SHA1

                            dcfbb6a5b8d05662c4858664f81693bb7f803b82

                            SHA256

                            4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                            SHA512

                            b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                            Filesize

                            264KB

                            MD5

                            f50f89a0a91564d0b8a211f8921aa7de

                            SHA1

                            112403a17dd69d5b9018b8cede023cb3b54eab7d

                            SHA256

                            b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                            SHA512

                            bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                            Filesize

                            1KB

                            MD5

                            5380bc48d13bfdf7b0eb129c5343de93

                            SHA1

                            1bde1b060fdd6b26b039698a667d9225d18bd137

                            SHA256

                            5c4ba7b4c9a7dbf8acd5ce9fa41c31639563fc27923276986484e732fa9f6e5e

                            SHA512

                            742a603c967d135fb907a6c58069802dceddeb2eea25d74a7820b824fe8ccf05f79ba8713c963b51d74c41c170d5f6142bd0520d4d3b0feec47cb5b473fab083

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                            Filesize

                            854B

                            MD5

                            377fd6a01c62658edc1d67a893e50950

                            SHA1

                            a67f94b622c86997ef8a7b40ca0873eee36095ce

                            SHA256

                            6b03f50ec373a3a28498eee2cf380423bb480be3425e1400577f230fb9bcbca5

                            SHA512

                            23b84ab1c4b3040296e717b07db3e9771b85ad2932a415856ed84f608e561046a490e432ce143ab31eeea8f59e2da6b39a108e1c2b668ae576d0130231418af6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            fbab60dde3c6cfde68de9fdcc9e0d7d0

                            SHA1

                            59c46a01a422d62e6bab3bdf6e978dee5e51ea3b

                            SHA256

                            c94d6f9d29ccaf0298de79393ecd5d0e45b152d855377b695e5954f5f96fbf33

                            SHA512

                            2034c9c2353a9cf6d584ae06b4936cda14dbee507ef41f308c079ade8d083c8d82097cfb295e2d3f9bff1c8897a5c9ea09a0e1832679a8f5f3cded71e53e9fc4

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            5962b7c87e5c8ed854b2a1a419695e75

                            SHA1

                            d85c984c276db45d9139116c925786696e6c3fb5

                            SHA256

                            f908c1d5f9e29f0a51edeb1f1ec5a0db50a8b656cee22bf9c474d91dfba735bf

                            SHA512

                            b2d738345bd7bbd6b89ae8d7e654feef55c0fa39461bc38284590ee1147d2733835ce93200ee70cb34aff24f4007814e72358623bc274d5799be92cea517a297

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                            Filesize

                            5KB

                            MD5

                            de6d12b88ea47999e60ecf3826835b50

                            SHA1

                            b126c3842f75d2af94b655a9959268fa69d32177

                            SHA256

                            38d3897a56d8310c96afe1062e7e4d9b9c8afc44b9b95c10934da339cae349fd

                            SHA512

                            880035ddc7dc3b3a208d30ac3a1d2785f90c0d335715591d2df60960f2a94ecd2753d240d306df2505bc0a2d2b5f2397fbbb3471998a0041f0e129695c33a97e

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                            Filesize

                            16B

                            MD5

                            18e723571b00fb1694a3bad6c78e4054

                            SHA1

                            afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                            SHA256

                            8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                            SHA512

                            43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                          • C:\Users\Admin\AppData\Local\Temp\CabFAC5.tmp

                            Filesize

                            70KB

                            MD5

                            49aebf8cbd62d92ac215b2923fb1b9f5

                            SHA1

                            1723be06719828dda65ad804298d0431f6aff976

                            SHA256

                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                            SHA512

                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                          • C:\Users\Admin\AppData\Local\Temp\TarFD48.tmp

                            Filesize

                            181KB

                            MD5

                            4ea6026cf93ec6338144661bf1202cd1

                            SHA1

                            a1dec9044f750ad887935a01430bf49322fbdcb7

                            SHA256

                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                            SHA512

                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                          • memory/2064-0-0x000007FEF5EC3000-0x000007FEF5EC4000-memory.dmp

                            Filesize

                            4KB

                          • memory/2064-3-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

                            Filesize

                            9.9MB

                          • memory/2064-2-0x000007FEF5EC0000-0x000007FEF68AC000-memory.dmp

                            Filesize

                            9.9MB

                          • memory/2064-1-0x000000013FA60000-0x000000013FA78000-memory.dmp

                            Filesize

                            96KB