Analysis
-
max time kernel
481s -
max time network
544s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
24/02/2025, 16:47
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/moom825/Discord-RAT-2.0/releases
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
https://github.com/moom825/Discord-RAT-2.0/releases
Resource
win11-20250217-en
General
-
Target
https://github.com/moom825/Discord-RAT-2.0/releases
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1176 msedge.exe 1176 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 3956 identity_helper.exe 3956 identity_helper.exe 4604 msedge.exe 4604 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe 4852 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 4480 1420 msedge.exe 77 PID 1420 wrote to memory of 4480 1420 msedge.exe 77 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 3476 1420 msedge.exe 78 PID 1420 wrote to memory of 1176 1420 msedge.exe 79 PID 1420 wrote to memory of 1176 1420 msedge.exe 79 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80 PID 1420 wrote to memory of 2944 1420 msedge.exe 80
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/moom825/Discord-RAT-2.0/releases1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd36e43cb8,0x7ffd36e43cc8,0x7ffd36e43cd82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1940 /prefetch:22⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4060 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,17729099256517417154,5547505774650280004,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3456
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD525d7facb86265ce3e89835dd7b566491
SHA14db1197fadadd7742986efdc2ca76f89cef96942
SHA2563d225a00da389fde7674a7eeb98e8572be2879252290ac00faa3a80ea671073f
SHA512cbfc02ffc441edc20c72b35d20b15178a2173e2a1c54e3736f7ba6d058e1ac7a5c1b15798bf5b91ed3a8197430f0fe84aa3d75a8aba61b4f4dd85c1b3fe68bbb
-
Filesize
152B
MD51ab6627d6da0724908361604b2b351b7
SHA1d6e7960616dd38cd05633face9bb0bdd061e3211
SHA25688a373cea6d7ad2daaee9168a0519f8a23ab9ec9cbceab97df4c8d39fe1544d0
SHA51259903d7dd6da68cb4378eceb6e356d5861514b8365da747da4cd05615ec7c7a51c810cbac6a7a00256db1aeedad80ef71b6ff06bae61e1884e620cc4a45a2d33
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD554596ba141261471291e07ad016b184e
SHA16055acf19e8b36dd2aba15b1749c974f52ed904d
SHA25644617f48af1be41c7e6a26283f140832d6139dc1270a19c39d4fbe147eecaa4f
SHA5128caf73a7bf9246b75272eb543605370c29ad3063895ad2da2c55783538445058c5f2b5bc8e1dc479597b1c451162c85671b4af10f09000d0b5b20afbb43512f4
-
Filesize
496B
MD5d22266ba3d8db30279b96944f0cec985
SHA144e288cdfe75a5e8299ce32e75dd9e0705cdbac9
SHA25677873629fa695e434160c86ae9116906ff65a97666d7d35a3ed63221b627c0bf
SHA512d463aecbdac835dace5544b4267c86c2ed7d3165ba95095db6dfc3a25655f2391fa202a81d37b4a76a36f04456ed86df137302ad0e456fd59ecdfee3c69c6c1b
-
Filesize
5KB
MD52a5f4afb8922c540549add34414f2694
SHA16345d9a2140c041ce1628f056c528b9f269163b7
SHA256446d1af9fc60a381bc1a71a65775438b0c42b0aedc812f34b9ab7b07ac810e8c
SHA512e876bfc1bb3f66207b22c66dcde576d75aa185cb2e8d93e40c61597d8f47ca21dd749def33c31895eca3a5d12ddc385ffdce8dea274bced916d071cac49081f0
-
Filesize
6KB
MD583250910044d6fd4a9602c3661eccc8d
SHA19493ad5c516e55598e90db33710f618734c16985
SHA2567b0dbead00b5dc0c6095bf5ed8dbc0d547d93153febc5b2ae91cb7dcf28b0c27
SHA5129e65c6c6387bbf0dda9c1f9077519d4251a76dec6573adb17b177ba7258b410746621c03be46334e425ea36324af3b33be96c335ad8862a6994a9e343e94db28
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5d1b73e7b4952920480bdbd0d3740cdb6
SHA11e26fc5a404a523c5f3304f7fb6a998290fe549d
SHA2566253eac2fdb3b13ea8d108f3eb16e3a7a90ca457666c3398d99ea988bdb7dff9
SHA512873835ea13f4597f04b26fd8cf09f3460f6a83cf328ee7fdfc405e32277182b1124d9df1daa3c068c146fe99da14dab82f53fed96d25aa03df14d48c5aeaaedb