Analysis

  • max time kernel
    61s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 21:11

General

  • Target

    RoseBetaV2.exe

  • Size

    25.0MB

  • MD5

    fc763af67d6332ca97e2631f3f69028e

  • SHA1

    7d3e5f9f9595b27871533c0be3d6337cb7a69ce1

  • SHA256

    01d2d27938986028a72ecd5073a3bec64ffc921b97d5b407e7139f119804b749

  • SHA512

    fa166cea85f734a4329abc8d5975decf613ac58aa89514a08b6fcf5a3bf0a6df9dc1696125b06769066ded1a572d306004c53100a83212e18ee704513bfc8f99

  • SSDEEP

    98304:8VuQs3NK4llQAKFisSbzEK5J4FESLD21qmW7+LwsbEqZ0tCeEjQEt7YX4/OTyQ6o:bQClaFnwrj4FdLD2IARbEFMBtIFTyQT

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzMzE1OTIyNDEwMDM5Mjk3MQ.GR-q2f.lSaO92LdHQXOf0Z9fXJ4_sgzy2GgWan5jLY5lI

  • server_id

    1233156916117504134

Extracted

Family

xworm

C2

3.67.112.102:16320

Attributes
  • Install_directory

    %AppData%

  • install_file

    XClient.exe

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detect Xworm Payload 2 IoCs
  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 15 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RoseBetaV2.exe
    "C:\Users\Admin\AppData\Local\Temp\RoseBetaV2.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHgAcQBjACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGkAbAB0ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGkAbQBpACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGcAZwBsACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3060
    • C:\Windows\Client-built.exe
      "C:\Windows\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2476
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2476 -s 600
        3⤵
          PID:1532
      • C:\Users\Admin\AppData\Local\Built.exe
        "C:\Users\Admin\AppData\Local\Built.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Users\Admin\AppData\Local\Built.exe
          "C:\Users\Admin\AppData\Local\Built.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1132
      • C:\Users\Admin\NovaFounderCheese.exe
        "C:\Users\Admin\NovaFounderCheese.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2540
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\NovaFounderCheese.exe'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2044
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'NovaFounderCheese.exe'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2424
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2072
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:576
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2176

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI26122\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      bcb8b9f6606d4094270b6d9b2ed92139

      SHA1

      bd55e985db649eadcb444857beed397362a2ba7b

      SHA256

      fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

      SHA512

      869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

    • C:\Users\Admin\AppData\Local\Temp\_MEI26122\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      4380d56a3b83ca19ea269747c9b8302b

      SHA1

      0c4427f6f0f367d180d37fc10ecbe6534ef6469c

      SHA256

      a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

      SHA512

      1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

    • C:\Users\Admin\AppData\Local\Temp\_MEI26122\python310.dll

      Filesize

      1.4MB

      MD5

      178a0f45fde7db40c238f1340a0c0ec0

      SHA1

      dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe

      SHA256

      9fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed

      SHA512

      4b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee

    • C:\Users\Admin\AppData\Local\Temp\_MEI26122\ucrtbase.dll

      Filesize

      992KB

      MD5

      0e0bac3d1dcc1833eae4e3e4cf83c4ef

      SHA1

      4189f4459c54e69c6d3155a82524bda7549a75a6

      SHA256

      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

      SHA512

      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ECS29H73245TFG14UR2Z.temp

      Filesize

      7KB

      MD5

      4481b3fcb587eda99032253176439cd5

      SHA1

      3019a85cc75b87b5d14d9da06bdbf37ad9f43640

      SHA256

      927287af64d384b1aecb8d1518c9474ae0ea869499b411884c64ca7c69e50074

      SHA512

      107c6f667b443a558b77ebb998211b3d34c79e4e7192657d66e12925e638af11517ad03515ad9d32381af3a83fdb55cae15fef79fd7d275cd52837a581503ef7

    • C:\Users\Admin\NovaFounderCheese.exe

      Filesize

      83KB

      MD5

      dcc70181300e5fed87d56e24489881cd

      SHA1

      7c49e610137a28efb2587533bd012afc0d4286ae

      SHA256

      afd21dd9eb2deb9dc4085ded1671e7224f2f508147301e9ae8419f16cc8d7da8

      SHA512

      0c1a95eab8d0227d832bb00ca3212af2a1864ebb84a5e259177c6d00f44f7a92ef70179084bf45d3282c5fb211b5131ac98c1079355ce3004d38673bf8ce48c0

    • C:\Windows\Client-built.exe

      Filesize

      78KB

      MD5

      f39e26fe4ea8c04693f5f13273c4a0b0

      SHA1

      4645e6bacf72e1cafca66f70b534e360bdc4612e

      SHA256

      2d4e30b4aea4334b3c8b2cb02a6dccb14282bf64d629bb7f0f0b5bd7cfa22cdb

      SHA512

      32d74137d1b3256bd2d7ebc8cbd12345904adbb176b78b4b982125f10f65fda1d8862c1080611ef31f5713b2f3afc60df5954e3e9b21ce7e8e4dac6093a768ea

    • \Users\Admin\AppData\Local\Built.exe

      Filesize

      6.7MB

      MD5

      034979f13de4bf0e71729917122bba64

      SHA1

      0f2cad58c5a7260d3104974323c509a5a0a737b7

      SHA256

      b5b872c3270b736d151b3ab719bdbb0b9f971c4a3ac64236e486a868b357f6ad

      SHA512

      bd5c3444e9be27650295c2a3e89d572b52eacc1f6f50fd9f38a9f1c0e92a42e90ed2da99166ee8e86eebc6b02d52f73a9ce9281da4d2d0b5e8458312962fd602

    • \Users\Admin\AppData\Local\Temp\_MEI26122\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • \Users\Admin\AppData\Local\Temp\_MEI26122\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      20ddf543a1abe7aee845de1ec1d3aa8e

      SHA1

      0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

      SHA256

      d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

      SHA512

      96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

    • \Users\Admin\AppData\Local\Temp\_MEI26122\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      2554060f26e548a089cab427990aacdf

      SHA1

      8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

      SHA256

      5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

      SHA512

      fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

    • memory/1132-97-0x000007FEEFF30000-0x000007FEF039E000-memory.dmp

      Filesize

      4.4MB

    • memory/2044-104-0x000000001B770000-0x000000001BA52000-memory.dmp

      Filesize

      2.9MB

    • memory/2044-105-0x0000000002070000-0x0000000002078000-memory.dmp

      Filesize

      32KB

    • memory/2424-111-0x000000001B600000-0x000000001B8E2000-memory.dmp

      Filesize

      2.9MB

    • memory/2424-112-0x0000000002860000-0x0000000002868000-memory.dmp

      Filesize

      32KB

    • memory/2476-9-0x000000013F7A0000-0x000000013F7B8000-memory.dmp

      Filesize

      96KB

    • memory/2540-20-0x0000000000A90000-0x0000000000AAC000-memory.dmp

      Filesize

      112KB

    • memory/2540-129-0x00000000006B0000-0x00000000006BC000-memory.dmp

      Filesize

      48KB

    • memory/2540-130-0x0000000000A80000-0x0000000000A8A000-memory.dmp

      Filesize

      40KB

    • memory/2540-136-0x00000000020C0000-0x00000000020CE000-memory.dmp

      Filesize

      56KB