Analysis

  • max time kernel
    100s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 00:55

General

  • Target

    02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27.exe

  • Size

    6.1MB

  • MD5

    fd5404ba372370044fed6b71d0b09d2b

  • SHA1

    fe246af6cf8c5ada290fbc9a45c998402d9f37bf

  • SHA256

    02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27

  • SHA512

    17c8d6223afcbaa2dd14cea2b65a19ca0ea939d83d0948e9ed02cc941a60795c8dc201c41bae356069fd5784fedeac8eec98d7441b9a178bce6037e5dc2e5eba

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 15 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Kills process with taskkill 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27.exe
    "C:\Users\Admin\AppData\Local\Temp\02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27.exe
      "C:\Users\Admin\AppData\Local\Temp\02b83b83fffb20aeb53e520e075f684d340a7569f57dac95474895ee06250a27.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /im Discord.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4916
        • C:\Windows\system32\taskkill.exe
          taskkill /im Discord.exe /f
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4204
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /im DiscordPTB.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4060
        • C:\Windows\system32\taskkill.exe
          taskkill /im DiscordPTB.exe /f
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2296
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill /im DiscordCanary.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2160
  • C:\Windows\system32\taskkill.exe
    taskkill /im DiscordCanary.exe /f
    1⤵
    • Kills process with taskkill
    • Suspicious use of AdjustPrivilegeToken
    PID:3088

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\VCRUNTIME140.dll
    Filesize

    87KB

    MD5

    0e675d4a7a5b7ccd69013386793f68eb

    SHA1

    6e5821ddd8fea6681bda4448816f39984a33596b

    SHA256

    bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

    SHA512

    cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\VCRUNTIME140.dll
    Filesize

    87KB

    MD5

    0e675d4a7a5b7ccd69013386793f68eb

    SHA1

    6e5821ddd8fea6681bda4448816f39984a33596b

    SHA256

    bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1

    SHA512

    cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_bz2.pyd
    Filesize

    87KB

    MD5

    e5ba852cb53065389044fe34474a4699

    SHA1

    d14401c170be8f73de67cfc7ea414dfb1c878ae5

    SHA256

    690bfd170e038b7b369eb4e4e32621823b1050d895bae3ef538c6382cdc1b2b0

    SHA512

    c6db73a39c563ac8395214ba1fa9807542b228ebcf6daef9e5478ba99acfcd8dc3d4816c68c51128bb421e8ee2f4625ec24fbe1ef2d268eb01ce09c37ed27101

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_bz2.pyd
    Filesize

    87KB

    MD5

    e5ba852cb53065389044fe34474a4699

    SHA1

    d14401c170be8f73de67cfc7ea414dfb1c878ae5

    SHA256

    690bfd170e038b7b369eb4e4e32621823b1050d895bae3ef538c6382cdc1b2b0

    SHA512

    c6db73a39c563ac8395214ba1fa9807542b228ebcf6daef9e5478ba99acfcd8dc3d4816c68c51128bb421e8ee2f4625ec24fbe1ef2d268eb01ce09c37ed27101

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_hashlib.pyd
    Filesize

    38KB

    MD5

    e2f401c211fab8c5e1517764e9175616

    SHA1

    7497eb47b63435d60e7d1bf20b2c946335e6671e

    SHA256

    76fb36e23b8f6821caec61c49f90b194632e68c9c78c9eb1f2e668c1b6383a73

    SHA512

    1312eaa7cc46b774392ae9e588c41b104eda43703e48e5b13702e15da665c0e5cc8e21b4011141c63811cd366a0d5773ff26c40c27159b80486bc491eef450a9

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_hashlib.pyd
    Filesize

    38KB

    MD5

    e2f401c211fab8c5e1517764e9175616

    SHA1

    7497eb47b63435d60e7d1bf20b2c946335e6671e

    SHA256

    76fb36e23b8f6821caec61c49f90b194632e68c9c78c9eb1f2e668c1b6383a73

    SHA512

    1312eaa7cc46b774392ae9e588c41b104eda43703e48e5b13702e15da665c0e5cc8e21b4011141c63811cd366a0d5773ff26c40c27159b80486bc491eef450a9

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_lzma.pyd
    Filesize

    251KB

    MD5

    c7bbbab8b4764c1c2bfd480dc649653c

    SHA1

    a5226b44fd42f39948174fab8b6ba5999104d831

    SHA256

    96205c0efbfbc282d3f4b76f8f2f189a409f365dbe9a9a088351a2906b18cd36

    SHA512

    aad92eb554af4a99647c770f8a0e988da78542df348e89b740f5f777b5acd992a896c9790598c2c9df35a4167347653e7b337ac98258b9c878c710582e7c21da

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_lzma.pyd
    Filesize

    251KB

    MD5

    c7bbbab8b4764c1c2bfd480dc649653c

    SHA1

    a5226b44fd42f39948174fab8b6ba5999104d831

    SHA256

    96205c0efbfbc282d3f4b76f8f2f189a409f365dbe9a9a088351a2906b18cd36

    SHA512

    aad92eb554af4a99647c770f8a0e988da78542df348e89b740f5f777b5acd992a896c9790598c2c9df35a4167347653e7b337ac98258b9c878c710582e7c21da

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_queue.pyd
    Filesize

    27KB

    MD5

    317191c97f22fbdde19cc96faac65075

    SHA1

    7f431344d8eb54775fbfd45d41a850b442a3ed8a

    SHA256

    0689472122c4947e14bfed7f9916c109c6ce218d7cbd4ee96dc9c0f787cfaec6

    SHA512

    af86e5b07bf3b2cab09726cfe8be06cbba2de0527ef5e630807d51235a94ba6644939b16d7e194172d05f6913a9e34248112ae790c4de1aa2139e79965b91c6e

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_queue.pyd
    Filesize

    27KB

    MD5

    317191c97f22fbdde19cc96faac65075

    SHA1

    7f431344d8eb54775fbfd45d41a850b442a3ed8a

    SHA256

    0689472122c4947e14bfed7f9916c109c6ce218d7cbd4ee96dc9c0f787cfaec6

    SHA512

    af86e5b07bf3b2cab09726cfe8be06cbba2de0527ef5e630807d51235a94ba6644939b16d7e194172d05f6913a9e34248112ae790c4de1aa2139e79965b91c6e

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_socket.pyd
    Filesize

    74KB

    MD5

    9f0683eb56d79d33ee3820f1d3504cc2

    SHA1

    0bf7a74e9040bb7ffda943ffef531520a9f419af

    SHA256

    39612c28eef633eef7e2e2c83a779fdda178d043d7aec0a07890e5d2a11cf4f8

    SHA512

    f086cc899b517ace259d27c048db5846552a7a8e57ddad4d6ea0b25b45e52282979309cea56bb56312aa83273b61f78b25b1ad6a61b6b3de33f5980c81ae6f32

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_socket.pyd
    Filesize

    74KB

    MD5

    9f0683eb56d79d33ee3820f1d3504cc2

    SHA1

    0bf7a74e9040bb7ffda943ffef531520a9f419af

    SHA256

    39612c28eef633eef7e2e2c83a779fdda178d043d7aec0a07890e5d2a11cf4f8

    SHA512

    f086cc899b517ace259d27c048db5846552a7a8e57ddad4d6ea0b25b45e52282979309cea56bb56312aa83273b61f78b25b1ad6a61b6b3de33f5980c81ae6f32

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_sqlite3.pyd
    Filesize

    83KB

    MD5

    71d8d3b5aa31b0bce21c1557bf2df269

    SHA1

    4e5b7c44ce996f5e6986d5a1eccb4441fb648590

    SHA256

    440aae80b5026dc0f2d4ad080079dec960d236063b3eef3a456b8fb0c954825d

    SHA512

    b4f536197739431e4d3ad922f2a861c72f43972ab279b17788666642a26cd04a5c0af00124ceb858e69004ecf49535f2b6ca4987c280beda08a89d34a8e5b405

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_sqlite3.pyd
    Filesize

    83KB

    MD5

    71d8d3b5aa31b0bce21c1557bf2df269

    SHA1

    4e5b7c44ce996f5e6986d5a1eccb4441fb648590

    SHA256

    440aae80b5026dc0f2d4ad080079dec960d236063b3eef3a456b8fb0c954825d

    SHA512

    b4f536197739431e4d3ad922f2a861c72f43972ab279b17788666642a26cd04a5c0af00124ceb858e69004ecf49535f2b6ca4987c280beda08a89d34a8e5b405

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_ssl.pyd
    Filesize

    120KB

    MD5

    a7fadacb8f4ff72a26f1ccbcfcdc33c1

    SHA1

    e73311cce41f1de6e01e13ef5745febf37fb3193

    SHA256

    b8232c839e99a3701657fe16f245e0afca2f269562682eb1a3468c47d07ac5cf

    SHA512

    a486a2c9fa2cf8a8b8c609a9f4d132c55c39dabcc1ea20455a27e23395515881c9cd396416796762777079aae6c6673dc9905bdcc92ff13d93e7e6c2a06403fe

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\_ssl.pyd
    Filesize

    120KB

    MD5

    a7fadacb8f4ff72a26f1ccbcfcdc33c1

    SHA1

    e73311cce41f1de6e01e13ef5745febf37fb3193

    SHA256

    b8232c839e99a3701657fe16f245e0afca2f269562682eb1a3468c47d07ac5cf

    SHA512

    a486a2c9fa2cf8a8b8c609a9f4d132c55c39dabcc1ea20455a27e23395515881c9cd396416796762777079aae6c6673dc9905bdcc92ff13d93e7e6c2a06403fe

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\base_library.zip
    Filesize

    767KB

    MD5

    1add74eaea6b192e13092d0a940820d9

    SHA1

    e4a2d2aa525459f923c98bad78f3681aa8b8d5cb

    SHA256

    dddf2b875e6f9a6884f86aa076fef40e6b1d3d1e8df33c2170db9b37bfab8bb2

    SHA512

    93599ad1af9338487393528a5f2317c7403f998a0f24c0a049c9c2a794f970a0512e9a6e8daf1c2dee2b985a0e2cb7d21b75d70d42f71b4aa60cd30cd6a2aac0

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\certifi\cacert.pem
    Filesize

    277KB

    MD5

    edd513e1d62ca2b059821b8380c19d19

    SHA1

    7e785afc6a7174f008b8b6e775c91c018d72aee3

    SHA256

    870068ef78059c5d012a23f715029f1b7db19060e1c65e12c024221f6ac32abd

    SHA512

    31450f875b46bbbb8e8d2f2e075f82ab4cfe175dadd966be22c66206d5dc2517a870a8cfc46f2f094b6810c09b447bd46354b67c128843b997957522d3cf4f5f

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\debugger.exe.manifest
    Filesize

    1KB

    MD5

    b5835e6940f8611ffd96fd44d396fea8

    SHA1

    83be12550d6c860a4d4bf9559328ccaf16a90272

    SHA256

    c0943256a8a6310de5d24d06814bd12a3a743d98f99beb8a0a9c8d35ebf9f414

    SHA512

    8c0cecf342409bde4374d6d91a3cb6af9437bfc9d9f5d02cbf42fcc30d49919c38a705f96d7dd750d2d4cb1bc1578825d497ab68802f413eac700f929a0688cf

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\libcrypto-1_1-x64.dll
    Filesize

    2.4MB

    MD5

    8c75bca5ea3bea4d63f52369e3694d01

    SHA1

    a0c0fd3d9e5688d75386094979171dbde2ce583a

    SHA256

    8513e629cd85a984e4a30dfe4b3b7502ab87c8bc920825c11035718cb0211ea0

    SHA512

    6d80d26d91b704d50ff3ad74f76d6b1afe98af3d7a18e43011dbe3809adc305b0e382c10868328eb82c9f8b4c77bca1522bdc023c7c8712057b65f6579c9dff5

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\libcrypto-1_1-x64.dll
    Filesize

    2.4MB

    MD5

    8c75bca5ea3bea4d63f52369e3694d01

    SHA1

    a0c0fd3d9e5688d75386094979171dbde2ce583a

    SHA256

    8513e629cd85a984e4a30dfe4b3b7502ab87c8bc920825c11035718cb0211ea0

    SHA512

    6d80d26d91b704d50ff3ad74f76d6b1afe98af3d7a18e43011dbe3809adc305b0e382c10868328eb82c9f8b4c77bca1522bdc023c7c8712057b65f6579c9dff5

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\libcrypto-1_1-x64.dll
    Filesize

    2.4MB

    MD5

    8c75bca5ea3bea4d63f52369e3694d01

    SHA1

    a0c0fd3d9e5688d75386094979171dbde2ce583a

    SHA256

    8513e629cd85a984e4a30dfe4b3b7502ab87c8bc920825c11035718cb0211ea0

    SHA512

    6d80d26d91b704d50ff3ad74f76d6b1afe98af3d7a18e43011dbe3809adc305b0e382c10868328eb82c9f8b4c77bca1522bdc023c7c8712057b65f6579c9dff5

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\libssl-1_1-x64.dll
    Filesize

    511KB

    MD5

    0205c08024bf4bb892b9f31d751531a0

    SHA1

    60875676bc6f2494f052769aa7d644ef4a28c5e5

    SHA256

    ebe7ffc7eb0b79e29bfc4e408ea27e9b633584dd7bc8e0b5ffc46af19263844b

    SHA512

    45da0c128bfb706cb0340ad40fbc691696f3483a0235faaac864dea4580b57e36aa5b4b55a60322081d2d2e2df788c550fd43c317582a9b6a2d66712df215bd0

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\libssl-1_1-x64.dll
    Filesize

    511KB

    MD5

    0205c08024bf4bb892b9f31d751531a0

    SHA1

    60875676bc6f2494f052769aa7d644ef4a28c5e5

    SHA256

    ebe7ffc7eb0b79e29bfc4e408ea27e9b633584dd7bc8e0b5ffc46af19263844b

    SHA512

    45da0c128bfb706cb0340ad40fbc691696f3483a0235faaac864dea4580b57e36aa5b4b55a60322081d2d2e2df788c550fd43c317582a9b6a2d66712df215bd0

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\python37.dll
    Filesize

    2.1MB

    MD5

    e55064447bdaa8c56ddbfa70cd5244dd

    SHA1

    937b586e6b9115d835908b55a2f0ef4bdebea42c

    SHA256

    90aa8d78fa95d90d50e4cf5916204b00287986687c99c205a9713bf8b28511e0

    SHA512

    022e70b2d93e5e88c09c078775b5bafd4f19b93fc687f1b584fe35a58c52a5adee25143054296f108cc11792c65c7d5eb487ee12ed768d887e74e21428e3a078

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\python37.dll
    Filesize

    2.3MB

    MD5

    d989794f308f5ab2516859bb879107cf

    SHA1

    6c241f2ac0641228b28fee6c4b910a38df004b11

    SHA256

    2bdba9c3d57128dc2fbea00239c76a0967357d7350d5c5781ed0e423fd0a9d65

    SHA512

    5dedb9a7f8a55c63404daa09f28c90ba536dd2f412b0eafd07db450c6a2c4014f7597d7cadba82bffda3743f1c2ae127c83b62e636a9755e9e37c66bcdf85633

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\select.pyd
    Filesize

    26KB

    MD5

    cf7bd630db53356c3dfd51ca8822b696

    SHA1

    202837642baa0d161d462039ab2441d491c6fe5f

    SHA256

    5ed33afc7f63de065457e0ef0852de0cc182a7111bd852e855eb9f48451b0e58

    SHA512

    4c32e03b670fa42f57e5e265e56e9845b719286ffecd8afcd583649fee11b803776f15ea28730925dc0c0b5510c18047ceda951fca1a716a1acc54f0dbc9e91a

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\select.pyd
    Filesize

    26KB

    MD5

    cf7bd630db53356c3dfd51ca8822b696

    SHA1

    202837642baa0d161d462039ab2441d491c6fe5f

    SHA256

    5ed33afc7f63de065457e0ef0852de0cc182a7111bd852e855eb9f48451b0e58

    SHA512

    4c32e03b670fa42f57e5e265e56e9845b719286ffecd8afcd583649fee11b803776f15ea28730925dc0c0b5510c18047ceda951fca1a716a1acc54f0dbc9e91a

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\sqlite3.dll
    Filesize

    1.1MB

    MD5

    e0faa2ddf1c05dabe10de1c4bfa6f705

    SHA1

    cc0aefb96654947a2081fe144c0c76438e4b77dc

    SHA256

    80830fe350e383dfec02b4ce090a14f9e1415e830c5c8fd9a2133e141c33ca5c

    SHA512

    70b3db39a69ed52135ccb067326daa2b830ac9e7d2107cb5538ebf0b049112eb3e7bef84e025a531554f35e0e43dbb4c84057c33ff1c9af7e8cabb579c117b2c

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\sqlite3.dll
    Filesize

    1.1MB

    MD5

    e0faa2ddf1c05dabe10de1c4bfa6f705

    SHA1

    cc0aefb96654947a2081fe144c0c76438e4b77dc

    SHA256

    80830fe350e383dfec02b4ce090a14f9e1415e830c5c8fd9a2133e141c33ca5c

    SHA512

    70b3db39a69ed52135ccb067326daa2b830ac9e7d2107cb5538ebf0b049112eb3e7bef84e025a531554f35e0e43dbb4c84057c33ff1c9af7e8cabb579c117b2c

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\unicodedata.pyd
    Filesize

    1.0MB

    MD5

    d009552163b6a795e0816ea5ce4928ce

    SHA1

    f3640f46037735667b6eba057f89a978a3901430

    SHA256

    5938061557e920e925a4e9b31f950b6d25c5ff10e143fe8e1f773466810ce2a2

    SHA512

    5ed7513a843d2e239aae8a4ce9cbb42366d9f2a0ea5adaedd8dd8c53493594ee3b5b118f766cc04d47d3eb31ec03eeb77b0dc05851de5a585f6970830b6e8580

  • C:\Users\Admin\AppData\Local\Temp\_MEI30162\unicodedata.pyd
    Filesize

    1.0MB

    MD5

    d009552163b6a795e0816ea5ce4928ce

    SHA1

    f3640f46037735667b6eba057f89a978a3901430

    SHA256

    5938061557e920e925a4e9b31f950b6d25c5ff10e143fe8e1f773466810ce2a2

    SHA512

    5ed7513a843d2e239aae8a4ce9cbb42366d9f2a0ea5adaedd8dd8c53493594ee3b5b118f766cc04d47d3eb31ec03eeb77b0dc05851de5a585f6970830b6e8580

  • memory/528-130-0x0000000000000000-mapping.dmp
  • memory/2160-166-0x0000000000000000-mapping.dmp
  • memory/2296-165-0x0000000000000000-mapping.dmp
  • memory/3088-167-0x0000000000000000-mapping.dmp
  • memory/4060-164-0x0000000000000000-mapping.dmp
  • memory/4204-163-0x0000000000000000-mapping.dmp
  • memory/4916-162-0x0000000000000000-mapping.dmp