Analysis
-
max time kernel
210s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 14:04
Static task
static1
Behavioral task
behavioral1
Sample
RoblxExtern.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
RoblxExtern.exe
Resource
win10v2004-20240709-en
General
-
Target
RoblxExtern.exe
-
Size
103KB
-
MD5
96f4ada678831287e0e65a893bcbaead
-
SHA1
6d31200f6c78548164c416c7143d1ae2496c9dcb
-
SHA256
60f0ed4e327ec2f37874d39d7d8112edd3ee5f3a88ac09d55f1e860ad1d16aab
-
SHA512
a055e1c871a6f0089d3643a714dc65effeab6eea62be996aab375a2941ab2c61099dd7fcfc0901784aebf9cceb31fbbe266d186c925953adede0e4d499a998d6
-
SSDEEP
1536:eAjVrqD0rWUVYqMdvM9m2o5+7nkG24dxugMGHd1mf2R6/ELA29o2IqQnsLTC+zhS:HFeyIj+0n+ym9EGWe
Malware Config
Extracted
discordrat
-
discord_token
MTI2MTY0NTg1NzE3MDY1MzIyNQ.G-aI1H.UjEBfSThVUjdMTWjryej5I5a1-xdH_S2NvpjfA
-
server_id
1261645179203616778
Signatures
-
Discord RAT
A RAT written in C# using Discord as a C2.
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2592 COM Surrogate.exe -
Loads dropped DLL 1 IoCs
pid Process 2592 COM Surrogate.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 19 IoCs
flow ioc 41 discord.com 101 discord.com 100 discord.com 104 discord.com 19 raw.githubusercontent.com 43 discord.com 57 discord.com 59 discord.com 60 discord.com 44 raw.githubusercontent.com 46 discord.com 49 raw.githubusercontent.com 58 discord.com 61 discord.com 17 raw.githubusercontent.com 42 discord.com 47 discord.com 102 discord.com 103 discord.com -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 756 SCHTASKS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe 2592 COM Surrogate.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2592 COM Surrogate.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2592 COM Surrogate.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3952 wrote to memory of 2216 3952 RoblxExtern.exe 90 PID 3952 wrote to memory of 2216 3952 RoblxExtern.exe 90 PID 2216 wrote to memory of 2592 2216 cmd.exe 91 PID 2216 wrote to memory of 2592 2216 cmd.exe 91 PID 2592 wrote to memory of 756 2592 COM Surrogate.exe 95 PID 2592 wrote to memory of 756 2592 COM Surrogate.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\RoblxExtern.exe"C:\Users\Admin\AppData\Local\Temp\RoblxExtern.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Office\COM SURROGATE.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe"C:\Users\Admin\AppData\Local\Office\COM SURROGATE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SYSTEM32\SCHTASKS.exe"SCHTASKS.exe" /create /tn "$77COM Surrogate.exe" /tr "'C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe'" /sc onlogon /rl HIGHEST4⤵
- Scheduled Task/Job: Scheduled Task
PID:756
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD557b48fa07b7e7accfabecf5930111111
SHA19e15ae353d456dee863484e2636f6f17140dcc31
SHA256e148ac15fff264c7a90c2ff7dab6f3fb3bf8f664e016805bf9015797095c34e5
SHA512108f84e26f601ba84d966125bd95a41e312df687f367ed1812dbf9d4d5c04ca0cdd228eedf35712ee47261c9b159f64f15aaf5d8563fba43c7134f6ec5cffd83
-
Filesize
695KB
MD5195ffb7167db3219b217c4fd439eedd6
SHA11e76e6099570ede620b76ed47cf8d03a936d49f8
SHA256e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d
SHA51256eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d