Overview
overview
10Static
static
3RootRAT.rar
windows7-x64
10RootRAT.rar
windows10-2004-x64
8RootRAT/Pl...am.dll
windows7-x64
3RootRAT/Pl...am.dll
windows10-2004-x64
8RootRAT/Plugin/ch.dll
windows7-x64
1RootRAT/Plugin/ch.dll
windows10-2004-x64
8RootRAT/Pl...ic.dll
windows7-x64
1RootRAT/Pl...ic.dll
windows10-2004-x64
8RootRAT/Pl...lg.dll
windows7-x64
3RootRAT/Pl...lg.dll
windows10-2004-x64
8RootRAT/Plugin/pw.dll
windows7-x64
3RootRAT/Plugin/pw.dll
windows10-2004-x64
8RootRAT/Pl...c2.dll
windows7-x64
1RootRAT/Pl...c2.dll
windows10-2004-x64
8RootRAT/Stub.ps1
windows7-x64
3RootRAT/Stub.ps1
windows10-2004-x64
8RootRAT/WinMM.Net.dll
windows7-x64
1RootRAT/WinMM.Net.dll
windows10-2004-x64
8RootRAT/nj...og.rtf
windows7-x64
4RootRAT/nj...og.rtf
windows10-2004-x64
8Resubmissions
14-02-2025 19:38
250214-ycpdzsxmck 1014-02-2025 19:38
250214-ycd81sxqav 814-02-2025 19:35
250214-yanpnsxlhn 10Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20250211-en -
resource tags
arch:x64arch:x86image:win10v2004-20250211-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2025 19:35
Static task
static1
Behavioral task
behavioral1
Sample
RootRAT.rar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RootRAT.rar
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
RootRAT/Plugin/cam.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RootRAT/Plugin/cam.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
RootRAT/Plugin/ch.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
RootRAT/Plugin/ch.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral7
Sample
RootRAT/Plugin/mic.dll
Resource
win7-20250207-en
Behavioral task
behavioral8
Sample
RootRAT/Plugin/mic.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
RootRAT/Plugin/plg.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
RootRAT/Plugin/plg.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral11
Sample
RootRAT/Plugin/pw.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
RootRAT/Plugin/pw.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral13
Sample
RootRAT/Plugin/sc2.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
RootRAT/Plugin/sc2.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral15
Sample
RootRAT/Stub.ps1
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
RootRAT/Stub.ps1
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
RootRAT/WinMM.Net.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
RootRAT/WinMM.Net.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral19
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
Resource
win10v2004-20250211-en
General
-
Target
RootRAT/nj_users/WINDOWS7_X64_Bilal Khan_B24AD1B6/Keylog.rtf
-
Size
179B
-
MD5
ed0018366207e1ccd3a46ccb37b6c2e4
-
SHA1
be32281c8020079a9ae1d186a54ba31babb199f5
-
SHA256
b1dd4fd8cdd2e913619884e6fa665afcebf917794e30e41cd756f6c514e306b6
-
SHA512
bd866b54e2cf3a59858e76b001055c0edceffebc2d06e8f08cc1f34efd70928380d78821220e336c1af0dac7d8ad339962c2062c629bb89121543b631675bc09
Malware Config
Signatures
-
Downloads MZ/PE file 1 IoCs
flow pid Process 131 2028 Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4272 MicrosoftEdgeUpdate.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3908 WINWORD.EXE 3908 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE 3908 WINWORD.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RootRAT\nj_users\WINDOWS7_X64_Bilal Khan_B24AD1B6\Keylog.rtf" /o ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3908
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7QjcwRkNGMTUtNEFEQS00OEU5LUJCRDYtQTM4NDg0RUNGQzUzfSIgdXNlcmlkPSJ7REIyRDBFQzMtOENCMS00RjBCLTgwN0ItRjQ0NUI0QjEzODk3fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7NDhGNzQwNDgtNERFOC00RkVBLUFBNUMtNEFBRjQ1ODVEOTJFfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4xOTA0MS4xMjg4IiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O0UreGJBejZZNnNVMTI4OWJTNnFsNFZSTGJramZCVUdUTUpzanJIcjQ0aUk9JnF1b3Q7Ii8-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzIiBpbnN0YWxsZGF0ZXRpbWU9IjE3MzkyODMzNzEiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4Mzc1NDE5Mjc1MzAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NDk3ODEwODkzIi8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD5f883b260a8d67082ea895c14bf56dd56
SHA17954565c1f243d46ad3b1e2f1baf3281451fc14b
SHA256ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353
SHA512d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize1KB
MD52107c34660ea7f146183d627a37d0c2c
SHA12dd220ed63f673a12f8a183a93dc35b31c807935
SHA2566735a731fa5d9251fd86859c921b0c1919af1bb3cb2db252a3e1cf379d8a5bc5
SHA51277e350e105596827675bd401983acafd68851f3b31ec39139b8ecc776fb4411e8d048f8e9e45948f7edac59f924f8a48d30c592dffe2eee23479ed0ad0fe570e