Analysis
-
max time kernel
11s -
max time network
13s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/02/2025, 02:13
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://discord.com
Resource
win7-20240903-en
General
-
Target
https://discord.com
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
flow ioc 6 discord.com 7 discord.com 15 discord.com 17 discord.com 18 discord.com 19 discord.com 3 discord.com -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{FD5DD371-F254-11EF-B20A-C60424AAF5E1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 916 IEXPLORE.EXE Token: SeIncBasePriorityPrivilege 916 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2208 iexplore.exe 2208 iexplore.exe 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE 916 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2476 wrote to memory of 2208 2476 explorer.exe 31 PID 2476 wrote to memory of 2208 2476 explorer.exe 31 PID 2476 wrote to memory of 2208 2476 explorer.exe 31 PID 2208 wrote to memory of 916 2208 iexplore.exe 32 PID 2208 wrote to memory of 916 2208 iexplore.exe 32 PID 2208 wrote to memory of 916 2208 iexplore.exe 32 PID 2208 wrote to memory of 916 2208 iexplore.exe 32
Processes
-
C:\Windows\explorer.exeexplorer https://discord.com1⤵PID:2552
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://discord.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2208 CREDAT:275457 /prefetch:23⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:916
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B3513D73A177A2707D910183759B389B_866DEC72621527AEAF83B2153FBFA6F7
Filesize471B
MD57a5487e04213f57d1c1272249e8b69c2
SHA1549119ae2b7852758208fad25109c05b8741104f
SHA2567b1111a5f0cf571770787c270ebe0291972394a6d3302dcf0d453328a8b819a4
SHA512c4d1f2be74c7f5b39cf71751efcda88b94235b5e9bf989c6da77f5601c12d0c5b34bfa328febd194cfcb1358e2efbaf9f3e5a333453995acbf5e14177962bfbd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5196c55f854ef338a63a97c6bda4ea860
SHA13ab4725e577026536c32c8ef0b2c2f80f0f7f9be
SHA2562c42416c444c9fb9a9e89adcbac7ee3304e89335ee9e35cdfd7290d3fc59766c
SHA512125418cc9325c6202ee3fba691c61296981f7d0a7fe0f0e0165a5e0779e9e86acfff5505b32aa659c35150a519a625cc76929d69bf276ec58b71b2bd8210809f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5310c783dbc547b284aad64a905e4e6b3
SHA1b2912b67c4c94a0850d52450c2591d2876e3f92b
SHA25688ff78b19fca0136a76b5471b21e0ab1ca65b18d4388fde6ba1178c87bfc95c2
SHA5129d05cbb90ba771e7efef680b48e796a67a737afd53d70be0bbd60ab2041f0bc717c1186409342f5a0e8385e2e12e86c85b3e4f53531df9c35bdd97b7d1b066d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54a498e22de0628faa19375e9966d1a2c
SHA108e5cda4d3172a0ebd1931f83fe21221dcc20b1f
SHA2563e670c59480c8c38a1002653a9cbe48ad7d3cf6f97f9af36c0c06672bb35034c
SHA512a49307535bb3110c017649261991dd3b15f9bcbb25f33f310061df02801a209ec8b759f5a277ca2426d5585a90d5bd8da8119b518f3997acf875ac936765b83d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d12c87d359b15ee3c3fc36a1b00519ad
SHA17a732b3e548a8eafc372ef334fa4cecc4ad96654
SHA256aa04e226de73af9ee7d26e63803c72e9523c6827fec8a7ebd6e3919cae862ad6
SHA5122b2807c2990eeab919c4d368481ea6c0a58c28e6000f3ad31eb912d16e0a19be28ee4e73237f17683a475f78a558660f0d9b7749c7bb920a7b69dafb7fe74e25
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59c7f1418706d3f473b8ca363da0ac5f7
SHA1e0e0d533b212340017c051bf7cc2f4364c4a67bb
SHA256d1015594e1046a39acf64e6cd475eafc10712ef2c90557e8d4935a8e61b4a34c
SHA5120a1d99e260343268876dd603f5ea5631cd1ff0b941bb1a30833f62d4ec87c2e0a8aaf81171629cd96230f63724e3f4287546f699fd9ead80f284325223d069b9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5f3ada9bfa409d5d4cb0f5478ce6bac
SHA11c5c066392d52d00e9918c5294d1dba4f1b97bd1
SHA25604b9715e4c3f4d17006f171f65e14fd9b1f064f46d880d97ff7781be89820fe4
SHA512c57dba95bbd481cc49b8953c407b88228491be3f008c1a784f6a03304568cb5439040804bdb732fe9a37c51bc47fb2a45b4994ef6d6b34ec71afed8d7effcfc8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bc5a9482dd1d13888382a806a6ff94a2
SHA186aa29a0bcb885ecfffc2d9214569a79107012e1
SHA25628dfcb0ed4078e5a923ce90eb2cdc428ab215db2618c85e9a9948234d8d84c7b
SHA51264193034db3165916e4ad635875959bfd71b62563161a0d17c26ea71cbbc5fb214d4f584a235cbc64e5a81da4feabbd462794637777f15413de1e66bff757aab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD538aac704a728e04833a705d2c7d8f2ee
SHA1173e1972592e262e8b161484c4965e69cef93a6e
SHA256138deac441a9387c1b313eafe494f6815b60ecaff5fcedf7eeffba14f25eeefd
SHA5125c1a60c5e8a74adfd0d2ff4cd5d7e8ae8311c6e9819b2cd05695c979337f2832b06ac79feb1803698dbb004dc76f9959d1fdbbfa33f7e3405cf03348d5fd38c6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5412d17c13f81d48a8e53a412d061ae39
SHA16ee4ec114dad2ab211d3a3168a8fab66a378e33a
SHA2568787e54d804589ec77b66972b84fb7e09df61820cb851e034f6fe44928a3c2a3
SHA5123e0e3afc37ef2f46137b4ab30ed26c60c6d79e9f95d46f4b1b8a2731f275287a6ae484643e03a9372c43ace3bafd6e8b79be16910647536b2c90e350eb29f2e7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B3513D73A177A2707D910183759B389B_866DEC72621527AEAF83B2153FBFA6F7
Filesize406B
MD5d986c92509ae549fe2dd27d58e4890d5
SHA1e66c45ef328fcb7974ad124a0b6e36e6317b776c
SHA25676f26847986bf7c35b706016d7a74678d7591a37753b1f33bcf5d49b9941a107
SHA5122bd5fcdf3626abc9edc15b27b33221e58548effec34a1cbc697dc966dd364b94282b7f965d4b7c4498ffb919b99bdf010e05ac1a2f0dfa352ff9f27f6cc334aa
-
Filesize
861B
MD58bc19f288b5b3817700c39bc2b516dea
SHA1343e3ae2a1e5ae6c2c449031ac3c9a8df2399bf0
SHA256842004b5732a998b47531ba145c18463f5a32153b82dcfd2c5c8b448dfdce812
SHA5128ed843d149c02b5206d0dbe8eafd35ff65529a35c0edcedfc5474051190957e9d83a678bf4e10f05709d8dd8b47fdc6aa6e92cc2ead4ea773733dd91dd0da768
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\62fddf0fde45a8baedcc7ee5_847541504914fd33810e70a0ea73177e%20(2)-1[1].png
Filesize557B
MD5c309ae41848547064c2ddb7dc66b6215
SHA16d9801822541e4be3ed25137c4e53a249c85ba2a
SHA25611848b5f1c8a7f294c6211c2f0d0dc83a8a28bfe1ef0829a8dacfdf475c5e5a2
SHA5123ef32b52e7070ca0fa9a8cf06e49fe43d67da63fd3a0cd0985363f6223c758440a44e65c3eebc7d6cee0b1ca3aedc4c6ee78b7167fc4136d90539d6ba18d030f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\652737c319ba7da75394c4b9_ggsans-BoldItalic[1].eot
Filesize87KB
MD5829b5bd09a7c123f48d3eaf05b822d81
SHA1ddb84be1e4ba00e603dbe9acb5daba3d76fb11d4
SHA25609126fcd7dff721fdc23724e29931429e92befabc22c4f653847adda720f3ee3
SHA51236973e23d4fb54dde084c25881dccda7491496fc8fc78b57db3f09f29d7a47401e35ab75f825be8dfbb780c221a3141f5812a7441d76803f92adf21fdcb3de34
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b