Analysis

  • max time kernel
    210s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-07-2024 14:04

General

  • Target

    RoblxExtern.exe

  • Size

    103KB

  • MD5

    96f4ada678831287e0e65a893bcbaead

  • SHA1

    6d31200f6c78548164c416c7143d1ae2496c9dcb

  • SHA256

    60f0ed4e327ec2f37874d39d7d8112edd3ee5f3a88ac09d55f1e860ad1d16aab

  • SHA512

    a055e1c871a6f0089d3643a714dc65effeab6eea62be996aab375a2941ab2c61099dd7fcfc0901784aebf9cceb31fbbe266d186c925953adede0e4d499a998d6

  • SSDEEP

    1536:eAjVrqD0rWUVYqMdvM9m2o5+7nkG24dxugMGHd1mf2R6/ELA29o2IqQnsLTC+zhS:HFeyIj+0n+ym9EGWe

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2MTY0NTg1NzE3MDY1MzIyNQ.G-aI1H.UjEBfSThVUjdMTWjryej5I5a1-xdH_S2NvpjfA

  • server_id

    1261645179203616778

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RoblxExtern.exe
    "C:\Users\Admin\AppData\Local\Temp\RoblxExtern.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Office\COM SURROGATE.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe
        "C:\Users\Admin\AppData\Local\Office\COM SURROGATE.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2592
        • C:\Windows\SYSTEM32\SCHTASKS.exe
          "SCHTASKS.exe" /create /tn "$77COM Surrogate.exe" /tr "'C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe'" /sc onlogon /rl HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:756
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3568

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe

      Filesize

      93KB

      MD5

      57b48fa07b7e7accfabecf5930111111

      SHA1

      9e15ae353d456dee863484e2636f6f17140dcc31

      SHA256

      e148ac15fff264c7a90c2ff7dab6f3fb3bf8f664e016805bf9015797095c34e5

      SHA512

      108f84e26f601ba84d966125bd95a41e312df687f367ed1812dbf9d4d5c04ca0cdd228eedf35712ee47261c9b159f64f15aaf5d8563fba43c7134f6ec5cffd83

    • C:\Users\Admin\AppData\Local\Office\Newtonsoft.Json.dll

      Filesize

      695KB

      MD5

      195ffb7167db3219b217c4fd439eedd6

      SHA1

      1e76e6099570ede620b76ed47cf8d03a936d49f8

      SHA256

      e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

      SHA512

      56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

    • C:\Users\Admin\AppData\Local\Office\x64\SQLite.Interop.dll

      Filesize

      1.7MB

      MD5

      65ccd6ecb99899083d43f7c24eb8f869

      SHA1

      27037a9470cc5ed177c0b6688495f3a51996a023

      SHA256

      aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

      SHA512

      533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

    • memory/2592-24-0x00007FFB6DF50000-0x00007FFB6EA11000-memory.dmp

      Filesize

      10.8MB

    • memory/2592-49-0x000002747A630000-0x000002747A6E2000-memory.dmp

      Filesize

      712KB

    • memory/2592-25-0x0000027478F90000-0x00000274794B8000-memory.dmp

      Filesize

      5.2MB

    • memory/2592-26-0x0000027478A60000-0x0000027478D2A000-memory.dmp

      Filesize

      2.8MB

    • memory/2592-27-0x000002745FD00000-0x000002745FD0A000-memory.dmp

      Filesize

      40KB

    • memory/2592-29-0x000002745FE40000-0x000002745FE52000-memory.dmp

      Filesize

      72KB

    • memory/2592-47-0x0000027478700000-0x000002747876A000-memory.dmp

      Filesize

      424KB

    • memory/2592-23-0x0000027478790000-0x0000027478952000-memory.dmp

      Filesize

      1.8MB

    • memory/2592-22-0x00007FFB6DF53000-0x00007FFB6DF55000-memory.dmp

      Filesize

      8KB

    • memory/2592-21-0x000002745E0A0000-0x000002745E0BC000-memory.dmp

      Filesize

      112KB

    • memory/2592-56-0x0000027478F30000-0x0000027478F6A000-memory.dmp

      Filesize

      232KB

    • memory/2592-57-0x000002745FEA0000-0x000002745FEC6000-memory.dmp

      Filesize

      152KB

    • memory/2592-61-0x00007FFB6DF53000-0x00007FFB6DF55000-memory.dmp

      Filesize

      8KB

    • memory/2592-62-0x00007FFB6DF50000-0x00007FFB6EA11000-memory.dmp

      Filesize

      10.8MB