Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 09:07
Behavioral task
behavioral1
Sample
bootstrapper.exe
Resource
win10v2004-20241007-en
General
-
Target
bootstrapper.exe
-
Size
78KB
-
MD5
bbcd1358829e3f227e2994cee4104a07
-
SHA1
ea5e32e8b9b2af737009cb6f80b6729b748fdfab
-
SHA256
92fce7a02eb2bcaa35ea632e9eb8534f44b0eb2839e94b7f80c91251fff5d251
-
SHA512
66af0ec9ba3d641ed50dd283fa61d5186824504d0779a6036300f4ecc24a6afc7e8143b1afd777d467b367cebe3258aab889cd317eba7cd21e5145ef5d90895c
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+1PIC:5Zv5PDwbjNrmAE+lIC
Malware Config
Extracted
discordrat
-
discord_token
MTMyNzkyMjgxNzUzODQ1NzY0MQ.GHccHA.ZdFmK2NR5y0hOF4icu1bgrMPm9-_Z95-15yAFc
-
server_id
1325467073790345276
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 47 raw.githubusercontent.com 49 discord.com 19 discord.com 24 discord.com 25 discord.com 46 raw.githubusercontent.com 60 discord.com 10 discord.com 12 discord.com 48 discord.com 59 discord.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133811465837718335" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 3944 bootstrapper.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe Token: SeShutdownPrivilege 4928 chrome.exe Token: SeCreatePagefilePrivilege 4928 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe 4928 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 2132 4928 chrome.exe 94 PID 4928 wrote to memory of 2132 4928 chrome.exe 94 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 2384 4928 chrome.exe 95 PID 4928 wrote to memory of 4268 4928 chrome.exe 96 PID 4928 wrote to memory of 4268 4928 chrome.exe 96 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97 PID 4928 wrote to memory of 752 4928 chrome.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\bootstrapper.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff84c89cc40,0x7ff84c89cc4c,0x7ff84c89cc582⤵PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1840 /prefetch:22⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1820,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2188 /prefetch:32⤵PID:4268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3164 /prefetch:12⤵PID:1476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3144,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4524 /prefetch:12⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4856,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4864 /prefetch:82⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4860,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5008 /prefetch:82⤵PID:1224
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5052,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5000,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5296,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4400,i,7757743005322753052,4320988667350708431,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4768 /prefetch:22⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD59ffa2b7fc042a6606346687a9ce74bd9
SHA1b7586821d880cdaa548e4e3378c850a14374a9a6
SHA256a3619d7fecd2eb46ab021c322a2c92c66f115bd136fc95d2619e907ecc539d9d
SHA51224d64d3a638f9198e062c0f0a2ed6b119cddbf54478aa74b3b4f92fa4b20fe87d074a30edac2ff6c73c4a7ff7178d81bd0404a3bd6863395fe695a40a3509735
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727