Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
23-02-2025 14:23
Static task
static1
Behavioral task
behavioral1
Sample
drawinggnp.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
drawinggnp.exe
Resource
win10v2004-20250217-en
General
-
Target
drawinggnp.exe
-
Size
429KB
-
MD5
8a8feb1deb767a7257ae83e7c8ba50a1
-
SHA1
d82dc1c082203bcd140084b3692a7ac90d030f79
-
SHA256
cc4f3f1d1faf2fd2fa35be966948bde128b96a42383059a5e251c1ddde4d5bfb
-
SHA512
55c594387b33493880a32e9ae9cfe19b9277d724f84f9a5e21656f57adffd2f8de93ae9838b260481c148014ac069083eacbd8170596fc94e370ca656f38ad9f
-
SSDEEP
12288:1ToPWBv/cpGrU3yyJeRxwwJM47j5xPJl1jrFaGi7w:1TbBv5rUV7k73PJlprFaGi7w
Malware Config
Extracted
discordrat
-
discord_token
MTM0MDIxMTU5ODQ0MjM2NDk1OA.GsPs9e.UKIsMiWYnYj__fIwwzy77n3fU9c1uXNxxH_Jhk
-
server_id
1340212470987620353
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Discordrat family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation drawinggnp.exe -
Executes dropped EXE 1 IoCs
pid Process 3968 Client-built.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
flow ioc 30 discord.com 35 discord.com 40 discord.com 41 discord.com 43 discord.com 15 discord.com 16 discord.com 21 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language drawinggnp.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Kills process with taskkill 1 IoCs
pid Process 528 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 4812 msedge.exe 4812 msedge.exe 1976 identity_helper.exe 1976 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3968 Client-built.exe Token: SeDebugPrivilege 528 taskkill.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3968 1308 drawinggnp.exe 87 PID 1308 wrote to memory of 3968 1308 drawinggnp.exe 87 PID 3968 wrote to memory of 784 3968 Client-built.exe 91 PID 3968 wrote to memory of 784 3968 Client-built.exe 91 PID 784 wrote to memory of 528 784 cmd.exe 93 PID 784 wrote to memory of 528 784 cmd.exe 93 PID 3968 wrote to memory of 4812 3968 Client-built.exe 94 PID 3968 wrote to memory of 4812 3968 Client-built.exe 94 PID 4812 wrote to memory of 1636 4812 msedge.exe 95 PID 4812 wrote to memory of 1636 4812 msedge.exe 95 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 4612 4812 msedge.exe 96 PID 4812 wrote to memory of 2828 4812 msedge.exe 97 PID 4812 wrote to memory of 2828 4812 msedge.exe 97 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98 PID 4812 wrote to memory of 3652 4812 msedge.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\drawinggnp.exe"C:\Users\Admin\AppData\Local\Temp\drawinggnp.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Client-built.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C taskkill /f /im explorer.exe3⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:528
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.pornhub.com/3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff1a7b46f8,0x7fff1a7b4708,0x7fff1a7b47184⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:24⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:84⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:14⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:14⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2664 /prefetch:14⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:14⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:84⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:14⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:14⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:14⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,6669340984067655421,9125259747649760341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:14⤵PID:4976
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2276
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fffde59525dd5af902ac449748484b15
SHA1243968c68b819f03d15b48fc92029bf11e21bedc
SHA25626bc5e85dd325466a27394e860cac7bef264e287e5a75a20ea54eec96abd0762
SHA512f246854e8ed0f88ca43f89cf497b90383e05ffa107496b4c346f070f6e9bbf1d9dc1bdcc28cad6b5c7810e3ba39f27d549061b3b413a7c0dd49faacae68cd645
-
Filesize
152B
MD5ab283f88362e9716dd5c324319272528
SHA184cebc7951a84d497b2c1017095c2c572e3648c4
SHA25661e4aa4614e645255c6db977ea7da1c7997f9676d8b8c3aaab616710d9186ab2
SHA51266dff3b6c654c91b05f92b7661985391f29763cf757cc4b869bce5d1047af9fb29bbe37c4097ddcfa021331c16dd7e96321d7c5236729be29f74853818ec1484
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD52bc95096c820adc78bcd17093009869e
SHA165647adc221a635ee05251fabf184c84c8ab939b
SHA256600484c98595c40c4b93f56eb9f528aa4707765a4ae64f8a984e7255e850e880
SHA51286fc5f0df06f1eb26358137420fea9930be5c526a6e51989be117f88d4426047f0bbadaf439efbae22147777e549d67c5e1ced19ed767aadd4dde42b55c6beee
-
Filesize
7KB
MD53bcb567badd17a5f30d883f80ba6b0f9
SHA1976b08e05f74dd67faa89356f163bdeeab07c50b
SHA256fb3617e36f22921a42648e325f3fb53c37722675e5cd701e282f3a73bd1f4bb6
SHA51227d157f473dbcc9b42a523c4e3dd83c6c45c86706ae43a02af87e18c56044ad0ec9aa7d70a2ded3eb9c94d6393df6b88ea9c490447382688d3d036358b64f039
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize168B
MD543a81c548e66cd05626ba6480a69dbe7
SHA15783cc20d85de2530c7fa22da935ad11a784addd
SHA256e797e36c8f5253e8cd445a1d51ae3e1a464feac89a582bf940e23a4e6334a06b
SHA51207c64962f2a46f8f0e0d02b80aa2e41945c9b621699f823c540809ece414b9d747da557d00ca0442b817e9fbf3caaf931eca358a6a50970317f2ef3ca585ccd6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe591e9a.TMP
Filesize48B
MD53cf12b52152d58ba155da540e7cad4bc
SHA1db19cf07686115d8db791a769f0d140e9e1e6960
SHA2565cb76e3b6c232e740ae21a111f20e7b3cb5608128f4e4aae6ad4377afaa524de
SHA512c6ffe7dec3533ef1f104b1850c9b151af21cecfe22ad7d66e0fd0a2bcd644e3387e2c1c9ee11296b658ad75c1f32e77b3706f5261f6fe3ba801e69df52e5246b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\ff72bfd0-f9ea-4c8a-82dc-b61db841fd13.tmp
Filesize6KB
MD50f964444ee1e4652a1eb4c3d80a55dbf
SHA1d6ecfc71bba3f725a865f4b3c278c8eea5d9fb23
SHA25636017da5bf0c77db9b4ae036937ab0eab1f6c8c6643f8d3ce11e92141bacf8fc
SHA5125e3ba5d3d13d9f4b3c4a8411bc8aa826cc3030fd928042c912a2d001c59196a281c7e335320f2b11438f4743252870b7d98dc13ec8c6c7093b7f169f89efe477
-
Filesize
11KB
MD55ace0f2523552f5264f4e4850021ec13
SHA1cdf549bd8471d72427f4424ae78da7afdcccb892
SHA2569eb7f2c1a500067bfef940b6498d6d1350eddff44badb5855deb3e3a50065040
SHA512a4ee1a4928350d060bfaa51bf9470c3a01b5ae58a61facaf4de22a06fbb3166acec4accc8d128f2904c649c059324d254f34484a7ed1b4cd773a46229177e6c9
-
Filesize
78KB
MD5ef3ab93f49ae126ffcb0d03dd93b5875
SHA14c1e92011e0d9248ed2adae0d1ceb0eb5d76717b
SHA25693bbf073730ab12ee5b65842552dd96f9f97befde9e2118c5734162fad2676d9
SHA5123f159629ad62e66f218684f45dc8718615a8aada9f181446630cc12d26db69b1df0d4b431e2d724a32b4f002097db9aea0f921f826db80e786e33fcbe7452da9