Analysis
-
max time kernel
6s -
max time network
1s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
rostrap.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
rostrap.exe
Resource
win10v2004-20240709-en
General
-
Target
rostrap.exe
-
Size
3.8MB
-
MD5
3da3fa7ef74e6912844e3b7eea44c475
-
SHA1
b8078c6b01a37c6b3bce3bd93eb11b8d5b88d37e
-
SHA256
6e97a3afc6580f3ca0f17a61ee98350d3d3be791bd4c9c3428926e3f40e199be
-
SHA512
a64cc30dd4f1c44f630bd91ffa6426ddc9af94fc85d40c7c30ec1869748b828362be4efadb6e54fc21f739217d1d587c24d37225f72a0dc4ed09a4a296e99136
-
SSDEEP
98304:O3GM47lTHdcFcNQBUb4vzWsyQj0jvDeug4WGR/JvY3csQ:O3GTp9ZyS8asyQjaLeugYR/JicsQ
Malware Config
Extracted
discordrat
-
discord_token
MTI2MTcwMjM0NDQ4ODUyMTgwOQ.GyJxES.iPPznz14IbFotKTZ3KViTwuS9T3PzEb13fnomo
-
server_id
1261715255004762132
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Executes dropped EXE 4 IoCs
pid Process 2644 rostrap_setup.exe 2700 BLOXST~2.EXE 1348 Process not Found 2808 ROSTRA~1.EXE -
Loads dropped DLL 8 IoCs
pid Process 2116 rostrap.exe 2644 rostrap_setup.exe 2644 rostrap_setup.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe 2844 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" rostrap_setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2644 2116 rostrap.exe 30 PID 2116 wrote to memory of 2644 2116 rostrap.exe 30 PID 2116 wrote to memory of 2644 2116 rostrap.exe 30 PID 2644 wrote to memory of 2700 2644 rostrap_setup.exe 31 PID 2644 wrote to memory of 2700 2644 rostrap_setup.exe 31 PID 2644 wrote to memory of 2700 2644 rostrap_setup.exe 31 PID 2644 wrote to memory of 2808 2644 rostrap_setup.exe 32 PID 2644 wrote to memory of 2808 2644 rostrap_setup.exe 32 PID 2644 wrote to memory of 2808 2644 rostrap_setup.exe 32 PID 2808 wrote to memory of 2844 2808 ROSTRA~1.EXE 33 PID 2808 wrote to memory of 2844 2808 ROSTRA~1.EXE 33 PID 2808 wrote to memory of 2844 2808 ROSTRA~1.EXE 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\rostrap.exe"C:\Users\Admin\AppData\Local\Temp\rostrap.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rostrap_setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rostrap_setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BLOXST~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BLOXST~2.EXE3⤵
- Executes dropped EXE
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ROSTRA~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ROSTRA~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2808 -s 5964⤵
- Loads dropped DLL
PID:2844
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD52c752edef5b0aa0962a3e01c4c82a2fa
SHA19c3afd1c63f2b0dbdc2dc487709471222d2cb81e
SHA256891846bf656253ca1cdd28584a28681e9604e2a03d74cd6b99313e3bff11daf8
SHA51204d25fe7d40c8c320ffc545a038ad6ea458df6a8a552b0e0393b369a03b9bf273c72f30169bd54e8eb10757c04bdddf3859c601c1eb9e1a12fe4d15658906dfe
-
Filesize
78KB
MD5c806f00fa32f343f9849c77003bb4cc1
SHA14a80c5b110f93d9dbcc85885bbf231de5ac8ace6
SHA2569ddd3757585f55bea693a536e7ec6c4de0fd46f7df565f9cf6d10e339af2e845
SHA512bac500e08913263bcabab7622eb7d00443d3d426cee9000edcd7b6089cf6e42be2a6b8f93fa60ef703b5400016febf8fb4c922ff17f2c80024a39450440deeb4
-
Filesize
3.5MB
MD5be5d8f72e1a5fdddf6f16de1c71e83a9
SHA1df4c647b0be4ec82e14e6775bdd1418b24263e68
SHA25618fc1de44a6e2886e845e94acf0df1c25e73276bfae587fedd8221b9544c89ef
SHA512b7a1cef87df06a463f060f6e8d84ec7317a526580106e049b4d5b699116c155bc358efb926d2393c764a8dc5c5aa4ca78def8deee93e26bcc260709c9f020528