Overview
overview
5Static
static
Discord-QR...in.zip
windows7-x64
1Discord-QR...in.zip
windows10-2004-x64
1Discord-QR...config
windows7-x64
3Discord-QR...config
windows10-2004-x64
3Discord-QR...ort.md
windows7-x64
3Discord-QR...ort.md
windows10-2004-x64
5Discord-QR...est.md
windows7-x64
3Discord-QR...est.md
windows10-2004-x64
3Discord-QR...ger.py
windows7-x64
3Discord-QR...ger.py
windows10-2004-x64
3Discord-QR...ICENSE
windows7-x64
1Discord-QR...ICENSE
windows10-2004-x64
1Discord-QR...ts.bat
windows7-x64
1Discord-QR...ts.bat
windows10-2004-x64
1Discord-QR...ay.png
windows7-x64
3Discord-QR...ay.png
windows10-2004-x64
3Discord-QR...te.png
windows7-x64
3Discord-QR...te.png
windows10-2004-x64
3Discord-QR...ies.py
windows7-x64
3Discord-QR...ies.py
windows10-2004-x64
3Analysis
-
max time kernel
132s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 13:32
Static task
static1
Behavioral task
behavioral1
Sample
Discord-QR-Token-Logger-main.zip
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Discord-QR-Token-Logger-main.zip
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Discord-QR-Token-Logger-main/.editorconfig
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Discord-QR-Token-Logger-main/.editorconfig
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Discord-QR-Token-Logger-main/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
Discord-QR-Token-Logger-main/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Discord-QR-Token-Logger-main/.github/ISSUE_TEMPLATE/feature_request.md
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Discord-QR-Token-Logger-main/.github/ISSUE_TEMPLATE/feature_request.md
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Discord-QR-Token-Logger-main/Discord-QR-Token-Logger.py
Resource
win7-20220901-en
Behavioral task
behavioral10
Sample
Discord-QR-Token-Logger-main/Discord-QR-Token-Logger.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
Discord-QR-Token-Logger-main/LICENSE
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
Discord-QR-Token-Logger-main/LICENSE
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Discord-QR-Token-Logger-main/install_requirements.bat
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
Discord-QR-Token-Logger-main/install_requirements.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Discord-QR-Token-Logger-main/resources/overlay.png
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Discord-QR-Token-Logger-main/resources/overlay.png
Resource
win10v2004-20220901-en
Behavioral task
behavioral17
Sample
Discord-QR-Token-Logger-main/resources/template.png
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Discord-QR-Token-Logger-main/resources/template.png
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Discord-QR-Token-Logger-main/utilities.py
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
Discord-QR-Token-Logger-main/utilities.py
Resource
win10v2004-20220901-en
General
-
Target
Discord-QR-Token-Logger-main/.github/ISSUE_TEMPLATE/bug_report.md
-
Size
1KB
-
MD5
592f59580e4f46081bfde715dcd2c180
-
SHA1
5f5e0304b2f33300ad1c0ac6e62b86615a5acaa4
-
SHA256
e030edfb057cc3e7c6c0be823305ffb514ad87a81bd21a6cd3ca1c17413a5115
-
SHA512
42d6e25f48bb6f6dfc4fd130759c75d20428911a4e93751fc11fc3e33d18936d2a099dd033f5f77b81d254b3060a96c820e497dbefba572690dd2e9adbb5294d
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{9AA460BA-5A8D-402E-A968-206E76DCC969}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{D27197C9-313D-4007-80C1-FB68E14CFA89}.catalogItem svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2416 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Discord-QR-Token-Logger-main\.github\ISSUE_TEMPLATE\bug_report.md1⤵
- Modifies registry class
PID:1544
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2416
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:4012