Overview
overview
10Static
static
10RtkAudUService64.exe
windows7-x64
7RtkAudUService64.exe
windows10-2004-x64
7discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
13s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 10:00
Behavioral task
behavioral1
Sample
RtkAudUService64.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
RtkAudUService64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
RtkAudUService64.exe
-
Size
74.7MB
-
MD5
3043c13e74eab4e910dc2a3f2ff9a97d
-
SHA1
128f6df1a59a97296dd7e95fec3875ea8c0ba0c3
-
SHA256
3fcdf428a7c2853ade38ee0dc6c4e8ac9598a3e0dff99879fd7524c270c7967c
-
SHA512
dee80ddd2c034c0076c6b340cc6dce3a1e1ae2e0d8217563b7b967d6837543aa5e722d84e64104c569bd1d86908aab11463ed813fc767e67d0ebc82d6016f2fd
-
SSDEEP
1572864:rvl9Q1l3ISk8IpG7V+VPhqUDE7BHlQonCiYKrhbOoAkTovSKZIgnW5l:rvl92hISkB05awUOHKGrFoxvSKegnW
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2932 RtkAudUService64.exe -
resource yara_rule behavioral1/files/0x0003000000020b1a-1273.dat upx behavioral1/memory/2932-1275-0x000007FEF6050000-0x000007FEF64D1000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2932 2464 RtkAudUService64.exe 30 PID 2464 wrote to memory of 2932 2464 RtkAudUService64.exe 30 PID 2464 wrote to memory of 2932 2464 RtkAudUService64.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe"C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe"C:\Users\Admin\AppData\Local\Temp\RtkAudUService64.exe"2⤵
- Loads dropped DLL
PID:2932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5365c9bfeb7d89244f2ce01c1de44cb85
SHA1d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1
-
Filesize
1.4MB
MD51661de9dc158325038ea32685a182107
SHA131a5b206059bfbdd333a43e800cb466f5e5a4d1a
SHA25621396ce6f622f16d6cba3d8ac1f469654fa49d9edd57d407919012fe26b03a0c
SHA512d8c50191f5adbca5b5d2693b13453765d0130ebcef6f4525865b2f7b93863134592aa3c0c91f92c7d5edb3d8ddf5a190ec76417717250035bcd66aeb11510656