Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 20:07
Behavioral task
behavioral1
Sample
rostrap.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
10 signatures
150 seconds
General
-
Target
rostrap.exe
-
Size
4.7MB
-
MD5
e26cd0708de26fc18a2af2ff6fdbddfa
-
SHA1
201b3445de0070cd054bc67818b2a2090118dcdd
-
SHA256
76393354a6a3ddebfbd5f53f185849e48c4ab158609ee2a24411ef4ad4a13bf2
-
SHA512
0a2897a2811b3980daa48c4f61aa66f5ea69d380af076876373276af7435e9c3f3336469b418ea6f314de75ddceb7e8da6c01660c7ebebbe52a40593c1b64bc1
-
SSDEEP
98304:fb3/VPhspHSrjl3GcqMOFm14O+rHJ49nDZcFMxnh:fjTaHsjl6M0mqO0QDZaMxnh
Malware Config
Extracted
Family
discordrat
Attributes
-
discord_token
MTI2MTcwMjM0NDQ4ODUyMTgwOQ.G6Bxmp.lZQNCu-ZZ94b9CGCSYHyNJ8h_8sgjGMX0iJAD8
-
server_id
1261770885514137682
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rostrap.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rostrap.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rostrap.exe -
resource yara_rule behavioral1/memory/3024-7-0x0000000140000000-0x0000000140C8E000-memory.dmp themida behavioral1/memory/3024-8-0x0000000140000000-0x0000000140C8E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rostrap.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
flow ioc 26 discord.com 27 discord.com 40 discord.com 41 discord.com 17 discord.com 22 discord.com 24 discord.com 52 discord.com 18 discord.com 25 discord.com 51 discord.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3024 rostrap.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 4288 systeminfo.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3024 rostrap.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3024 wrote to memory of 3976 3024 rostrap.exe 90 PID 3024 wrote to memory of 3976 3024 rostrap.exe 90 PID 3976 wrote to memory of 4288 3976 cmd.exe 92 PID 3976 wrote to memory of 4288 3976 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\rostrap.exe"C:\Users\Admin\AppData\Local\Temp\rostrap.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C SYSTEMINFO2⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\system32\systeminfo.exeSYSTEMINFO3⤵
- Gathers system information
PID:4288
-
-