Analysis
-
max time kernel
64s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31-01-2025 13:10
Behavioral task
behavioral1
Sample
Free robux.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Free robux.exe
Resource
win10v2004-20250129-en
General
-
Target
Free robux.exe
-
Size
78KB
-
MD5
224ffc7642433a54523e38d9bd28a7b4
-
SHA1
45ce3d4b4161a916b6c3c1126fe19bf1a0ce9490
-
SHA256
e81c03f063eb81973ecbc690961658b9d613e1648c3612fbc1ffdd41fbf1f7b3
-
SHA512
1960f6a2bb79f258c0e78d056caf7a384eff84bd50439eff68a85cdedab416d2623607cc98351d457b5f2cb1e89096ca99a06b8210ec749dc44f050427ae1eb3
-
SSDEEP
1536:52WjO8XeEXFh5P7v88wbjNrfxCXhRoKV6+V+dPIC:5Zv5PDwbjNrmAE+NIC
Malware Config
Extracted
discordrat
-
discord_token
MTMzNDc5OTg4Mjg4Nzg4ODk1OQ.GYogWp.NMtpgtuN4Hf6PsEomIL-OoyUKqRkEVtf5alRts
-
server_id
1334800372321222707
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe Token: SeShutdownPrivilege 2776 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe 2776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2164 1232 Free robux.exe 30 PID 1232 wrote to memory of 2164 1232 Free robux.exe 30 PID 1232 wrote to memory of 2164 1232 Free robux.exe 30 PID 2776 wrote to memory of 2796 2776 chrome.exe 33 PID 2776 wrote to memory of 2796 2776 chrome.exe 33 PID 2776 wrote to memory of 2796 2776 chrome.exe 33 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2780 2776 chrome.exe 35 PID 2776 wrote to memory of 2788 2776 chrome.exe 36 PID 2776 wrote to memory of 2788 2776 chrome.exe 36 PID 2776 wrote to memory of 2788 2776 chrome.exe 36 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37 PID 2776 wrote to memory of 1996 2776 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Free robux.exe"C:\Users\Admin\AppData\Local\Temp\Free robux.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1232 -s 5962⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef70b9758,0x7fef70b9768,0x7fef70b97782⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:22⤵PID:2780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:82⤵PID:2788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:82⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2300 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:12⤵PID:1652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2312 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:12⤵PID:3008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1840 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:22⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1364 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:12⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3668 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:82⤵PID:1528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4044 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:82⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 --field-trial-handle=1404,i,2146007491666076749,7797972227743224347,131072 /prefetch:82⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
358KB
MD550bae8cc6fc7e636f688c0b4ab4e1424
SHA16cae25509646255ed8ed75df189e5331ccf1e244
SHA25618912d7ec1253a5c3c6d359a20250d5e940111ffd43d9644d2ddb66b7ce0d5ea
SHA512d0d5dd3c35212282a99920ddeb16cc1c0aa42731e83cf2e0d893cb0fbdc1e280c5ffa7c0aa0ba26e4b7e087882f79924d25f463dcf0fd3eb17398232249c9232
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD50099c3ef0fa2c67f60d40f702811fdaa
SHA169abdfd31c9f15671988115ea90d591e2169a6bf
SHA256ea89ba3b44e0527b608ae1662079a434b39253ce3306b7522df4903cb2c2e82d
SHA512fcdaec752d2f79ebb0e7d361f6d683702adf753b3a0d05a2f422ce45711d7d81e358a1bfd650deeb3c0304cb9d799a7b4c7d07260d393375c92b3eb4fb329bfc
-
Filesize
5KB
MD537e21fca2961d89ec20e8922659c187b
SHA1df90d3293271fe112eec4839724ea3a241abb3f3
SHA2561bb6260c3b7f6aca7662aecc9fc5556e09078b050ff2c6492b380cd1a8c5602b
SHA512c2d56a18237cffe4ee81fbb4a52b0eeb065b55f3fe2c6f86831acf8301b818543afdd31bc01a0816ce7f2589a2ed0426b6a8970b40671598f3f5276ef50fa642
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
358KB
MD53afa0b3bb950fcbbafb1cf7ffe5fd113
SHA12c220091aa7cad5e85d5ea2c9fedd81168aa6e37
SHA256643f12dc67c664c3beb22e8919e465143dacd377fe8a0eb0dfc962ef988674db
SHA51278ceb8303cf5f4ba37fe988888be3a72d453e9fac3acc6b5933b95f68323b511dffc6d9530224d1d38b7e36800600289fd2cd21515a7f2500ac8c16cd48b441a
-
Filesize
177KB
MD5834a6e457200bcc68e57ea54b08bd8b6
SHA19b3128a7ebf0c2ac41bdf208f18cc20ea528f205
SHA2562990a9df5f4b65a36f25371c5b96e62c5da7864b5db19a7696e429e648ce6571
SHA51274a5c8b3cec1003205aa900f28f5d1631fa7a16184f40f95bd2961fcbdc479a9cf2b9724232584c2ddd74c098b653410023eba1b8c72cd999ee084b560733113