Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 14:14

General

  • Target

    RoblxExtern.exe

  • Size

    103KB

  • MD5

    96f4ada678831287e0e65a893bcbaead

  • SHA1

    6d31200f6c78548164c416c7143d1ae2496c9dcb

  • SHA256

    60f0ed4e327ec2f37874d39d7d8112edd3ee5f3a88ac09d55f1e860ad1d16aab

  • SHA512

    a055e1c871a6f0089d3643a714dc65effeab6eea62be996aab375a2941ab2c61099dd7fcfc0901784aebf9cceb31fbbe266d186c925953adede0e4d499a998d6

  • SSDEEP

    1536:eAjVrqD0rWUVYqMdvM9m2o5+7nkG24dxugMGHd1mf2R6/ELA29o2IqQnsLTC+zhS:HFeyIj+0n+ym9EGWe

Malware Config

Extracted

Family

discordrat

Attributes
  • discord_token

    MTI2MTY0NTg1NzE3MDY1MzIyNQ.G-aI1H.UjEBfSThVUjdMTWjryej5I5a1-xdH_S2NvpjfA

  • server_id

    1261645179203616778

Signatures

  • Discord RAT

    A RAT written in C# using Discord as a C2.

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 27 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\RoblxExtern.exe
    "C:\Users\Admin\AppData\Local\Temp\RoblxExtern.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4520
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c start "" "C:\Users\Admin\AppData\Local\Office\COM SURROGATE.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3308
      • C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe
        "C:\Users\Admin\AppData\Local\Office\COM SURROGATE.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3700
        • C:\Windows\SYSTEM32\SCHTASKS.exe
          "SCHTASKS.exe" /create /tn "$77COM Surrogate.exe" /tr "'C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe'" /sc onlogon /rl HIGHEST
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1112

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Office\COM Surrogate.exe

          Filesize

          93KB

          MD5

          57b48fa07b7e7accfabecf5930111111

          SHA1

          9e15ae353d456dee863484e2636f6f17140dcc31

          SHA256

          e148ac15fff264c7a90c2ff7dab6f3fb3bf8f664e016805bf9015797095c34e5

          SHA512

          108f84e26f601ba84d966125bd95a41e312df687f367ed1812dbf9d4d5c04ca0cdd228eedf35712ee47261c9b159f64f15aaf5d8563fba43c7134f6ec5cffd83

        • C:\Users\Admin\AppData\Local\Office\Newtonsoft.Json.dll

          Filesize

          695KB

          MD5

          195ffb7167db3219b217c4fd439eedd6

          SHA1

          1e76e6099570ede620b76ed47cf8d03a936d49f8

          SHA256

          e1e27af7b07eeedf5ce71a9255f0422816a6fc5849a483c6714e1b472044fa9d

          SHA512

          56eb7f070929b239642dab729537dde2c2287bdb852ad9e80b5358c74b14bc2b2dded910d0e3b6304ea27eb587e5f19db0a92e1cbae6a70fb20b4ef05057e4ac

        • C:\Users\Admin\AppData\Local\Office\x64\SQLite.Interop.dll

          Filesize

          1.7MB

          MD5

          65ccd6ecb99899083d43f7c24eb8f869

          SHA1

          27037a9470cc5ed177c0b6688495f3a51996a023

          SHA256

          aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4

          SHA512

          533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d

        • memory/3700-24-0x00007FFD130E0000-0x00007FFD13BA1000-memory.dmp

          Filesize

          10.8MB

        • memory/3700-49-0x000001E471CF0000-0x000001E471DA2000-memory.dmp

          Filesize

          712KB

        • memory/3700-25-0x000001E471E20000-0x000001E472348000-memory.dmp

          Filesize

          5.2MB

        • memory/3700-26-0x000001E4718F0000-0x000001E471BBA000-memory.dmp

          Filesize

          2.8MB

        • memory/3700-27-0x000001E470030000-0x000001E47003A000-memory.dmp

          Filesize

          40KB

        • memory/3700-29-0x000001E470060000-0x000001E470072000-memory.dmp

          Filesize

          72KB

        • memory/3700-47-0x000001E471BC0000-0x000001E471C2A000-memory.dmp

          Filesize

          424KB

        • memory/3700-23-0x000001E470B60000-0x000001E470D22000-memory.dmp

          Filesize

          1.8MB

        • memory/3700-22-0x000001E46E3D0000-0x000001E46E3EC000-memory.dmp

          Filesize

          112KB

        • memory/3700-21-0x00007FFD130E3000-0x00007FFD130E5000-memory.dmp

          Filesize

          8KB

        • memory/3700-56-0x000001E471C30000-0x000001E471C6A000-memory.dmp

          Filesize

          232KB

        • memory/3700-57-0x000001E470B10000-0x000001E470B36000-memory.dmp

          Filesize

          152KB

        • memory/3700-61-0x00007FFD130E3000-0x00007FFD130E5000-memory.dmp

          Filesize

          8KB

        • memory/3700-62-0x00007FFD130E0000-0x00007FFD13BA1000-memory.dmp

          Filesize

          10.8MB