Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22-02-2025 14:54
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://anonymfile.com/1yOZ1/ratbuilder-by-enwyry.rar
Resource
win10v2004-20250217-en
General
-
Target
https://anonymfile.com/1yOZ1/ratbuilder-by-enwyry.rar
Malware Config
Extracted
discordrat
-
discord_token
MTM0MjgyOTkzMTY3OTQ1MzIzNA.G9G3LT.--9Pc4c80bfAzsV_x7j4dUjz1am-i9VHnHWs0Q
-
server_id
1342829779400786014
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Executes dropped EXE 1 IoCs
pid Process 4556 RATbuilder by @enwyry.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 129 discord.com 130 discord.com 135 discord.com -
Checks SCSI registry key(s) 3 TTPs 7 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133847097513266895" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe Token: SeShutdownPrivilege 4924 chrome.exe Token: SeCreatePagefilePrivilege 4924 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 1700 7zG.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4924 chrome.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe 4416 taskmgr.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe 2312 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2824 4924 chrome.exe 84 PID 4924 wrote to memory of 2824 4924 chrome.exe 84 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 4352 4924 chrome.exe 86 PID 4924 wrote to memory of 1212 4924 chrome.exe 87 PID 4924 wrote to memory of 1212 4924 chrome.exe 87 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88 PID 4924 wrote to memory of 1016 4924 chrome.exe 88
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://anonymfile.com/1yOZ1/ratbuilder-by-enwyry.rar1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff90d50cc40,0x7ff90d50cc4c,0x7ff90d50cc582⤵PID:2824
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:4352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2160 /prefetch:32⤵PID:1212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3116,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:2052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:4836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4456 /prefetch:12⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4928,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4900 /prefetch:12⤵PID:1996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4536,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:1076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3824,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:3540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4560,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:1360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5100,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4708,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4916 /prefetch:12⤵PID:1128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:2724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5496,i,14255744553255599484,1631702549841163088,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=6088 /prefetch:82⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1092
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2312
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4756
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:2656
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\New folder\" -an -ai#7zMap1112:122:7zEvent176421⤵
- Suspicious use of FindShellTrayWindow
PID:1700
-
C:\Users\Admin\Desktop\New folder\RATbuilder by @enwyry.exe"C:\Users\Admin\Desktop\New folder\RATbuilder by @enwyry.exe"1⤵
- Executes dropped EXE
PID:4556
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4416
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt1⤵PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD57c1df77912e625e76b29435465f840af
SHA106f1f54fef841d506429a84a0f90e4593de526ab
SHA256e82b797e3e86503aac5eeaf5afbc7ab1d46ee1e02cdf09c9fb61852ce74b786c
SHA5126e4e92a613b74908fab413279ca4fedc661f5f4ba73a52648fc9a6650c4e7f3f398a5d518222dc11a7a6c58f6b789e9cab6c29197e5e89494621db2c0dd8e2a8
-
Filesize
624B
MD570b3a702037a397233be26d3a26e6028
SHA16544630603351b7e8864a9b862885ef6f9441f3a
SHA25600ac9115734084584a563f2e3c6d3e6040f551f0ab7ae41a7ac254dc745688e8
SHA5120547922ad01afded29d774af7191a6320e5895268661c6af57da8ca1b4d783c240917a3433c37069b7f2648cc0f1cdebf87de80892625996e6821231384270ee
-
Filesize
6KB
MD58a669248fc3beb57ec3cecd86ad9d098
SHA1cefd0326db29f7ebf7858dea25e1e24d9001d3c7
SHA2564cf6202aa23bd4726b5e78e8eb79b79fab3c756ed373f407e487c79a20521dff
SHA512b2d0ff26ddbdb4d6b2ac812760ed84a7c2e3b52d0827214e8b444e2e44235318c6cda3f5f539fbdb892b02cfd7c52588b075305f764cfd8f44e909581767024a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1KB
MD5e3fc9ff74ce2b8e00bf564d4f0d82797
SHA151227acb0dcd95eabc76ad98086b59d17f52cbe1
SHA2563882958a6d1453af3212e092b3e37e74b9e30a86757a385d57fad063c88762c5
SHA5127ef531882e848812fbdd0ce6ecfb45b07ea1608c0a0d2f0ccabcbaeb7fa849bf795cff69cd43c0202d0b5d0abdad9e2839843cd941feebfd789c478d139b5eef
-
Filesize
1KB
MD58b1c59606da17f8606d771989892cb33
SHA1cdeb5fdf146b7f123ade741cbc8d2d47ba0cc884
SHA256ce5af8825a34eeeb2871c060e0a91ab8c56fd267bc5daffc94b45a45986254c7
SHA512d9cf1bce7e73c479fe9c1a35609b82d9db6814dfe566b4e84b24200be409cc4e433a073125e6c5b5d5c27c5f12950a90421ee1cc2bb4d78bd86061332866c774
-
Filesize
11KB
MD5a206ae0dd9a17b94f61e3792c6b4835d
SHA11b41ce7fb5ed7f04e297d76b0c6632d56a8b5181
SHA256d0023a5b6976f7cd7805606d455f880c65babbb1a8adc9c05e509a89470f0fb3
SHA512e396cb5ca85d408337f3a400e45d723fd362caf5538eb3e4dedade389ae9b64e30b1e6ce334c8987ef790fc7f43256ac00081f9f23ff4b625130ae49e3eff8c7
-
Filesize
10KB
MD58b8b5b7812ef89ba3f01cfde473232f3
SHA1ee207f5e312ce5b74af55c6a3f68c65b3a3c2622
SHA2563989855f18dfa4ac06f0be4169130e67e5f3f94ee5cc3cf6d55e6878463c5a97
SHA512d36cd6068bba7c2713418fa9fe3692d7763148ff5d7381cd84e005ff323ccd83d10e889ec17ad44c13d6f41e26150f52eec04526b72d6af4d8f2ff0b2a5bd82e
-
Filesize
12KB
MD54547d250071e3b68fd44677ce94d07c6
SHA1c1d66c4bbafdd6980ba5e498057218d6a27fb1b9
SHA256147d5df4f2de108249f56251cd92ce04d88f08e85726a6590f75259a1ee4991c
SHA5129dffe9cd4d2ff60e34a88c1130734efeb8c2183b4c966682a0b4d5c1eb050311eb844a9c437c5fde6d78f435826d71fd82c0932fbd8f6e47daa89c8585db8ef8
-
Filesize
123KB
MD5f03b7becf3c6dfbd707ca351fcd155e1
SHA169bb39a0936f576999f80244f0dd7b3772adb645
SHA2564e07b277244e3bd3e625b422a4369552226859282ce42f24f05091a81a31f554
SHA5129bf2fae497c20c2648061e3ee05c346c6db1265b888976e8d144dfb936f63dd26a37afb228cc4de6c28bd1c01821e93aecd8e2fc7734f909ac80fc5a3a72a323
-
Filesize
123KB
MD5fe4d3cda7e7820f527afee98cba3b35e
SHA1e2bc5d682770cbf37334470a9cb7f847980f2f9c
SHA256e0cf1db802d32d99f5e8f594a343715946e94fad938193b47b3e2b23653d8328
SHA512b3d9b30b9fb6975a3c92c9f748bbcafcf0e7ef0760344d10d2e3712232dcc2a6a9d2ae71b1c8401afe4e0f36e66f5bf466a1cf14652fc31ea2927c7e78454616
-
Filesize
264KB
MD53df4ea47c476d8a74747c578f771ccc1
SHA15f2e014371295f274d2568bf8a10eb55cc45dfb4
SHA256825a47691cab3c9970fa3e9dfa66e82be1ac5ae057dacff07a26371ee27a2a1b
SHA512336fa194626c1a8c93ea856eb2d0812afe7a67b40a4d1b85d24d4aa7354602ad06a9790bb0ad9216cb44dcbfa88bfa291e4f5d05daaadd1c53e8ec9c5c3680b0
-
Filesize
78KB
MD5fbe87411872d49ad5de921851a0b4c81
SHA14ee0b0b9e3ea307af38aaf3489c659bfbb962119
SHA25647c9a59f46ecfdf52e6f2754c23d564ad2c1365d524f71e78fdaee9ac6292cf8
SHA512bd0ddef80ecc11042999efba592109f0b6b4d39a150aba8c07875ca3bf865c40b015168b750d736339f088a760c048c89af1060d37b5f84ec424843c14194c2d
-
Filesize
26KB
MD527b24058b1643e96a7dd576b4c6529ee
SHA1138562b2a1f1caa43bbe43561f395ebe5b65f767
SHA256d6a9f1c1365ac323c37a58ec41e301c927ab5e49c2f0dbe40863bd379d50e555
SHA512de2d2433d928db99468453318bf7f0c4a10842d32f44d17cdc33a06510a29e084345bb12f30a72e9e7d88d404beb00e8a28ef17e92317be497126d77deb6d5a7