Overview
overview
10Static
static
10Discord To...rd.exe
windows7-x64
7Discord To...rd.exe
windows10-2004-x64
8Discord To...ain.py
windows7-x64
3Discord To...ain.py
windows10-2004-x64
3Discord To...OR.dll
windows7-x64
1Discord To...OR.dll
windows10-2004-x64
1Discord To...hy.dll
windows7-x64
1Discord To...hy.dll
windows10-2004-x64
1Discord To...to.dll
windows7-x64
1Discord To...to.dll
windows10-2004-x64
1Discord To...on.dll
windows7-x64
1Discord To...on.dll
windows10-2004-x64
1Discord To...le.exe
windows7-x64
3Discord To...le.exe
windows10-2004-x64
3Discord To...pp.xml
windows7-x64
1Discord To...pp.xml
windows10-2004-x64
1Discord To...rv.exe
windows7-x64
9Discord To...rv.exe
windows10-2004-x64
9Discord To...ram.js
windows7-x64
1Discord To...ram.js
windows10-2004-x64
1Discord To...er.vbs
windows7-x64
1Discord To...er.vbs
windows10-2004-x64
1Discord To...es.vbs
windows7-x64
1Discord To...es.vbs
windows10-2004-x64
1Discord To...csproj
windows7-x64
3Discord To...csproj
windows10-2004-x64
3Discord To...LI.exe
windows7-x64
1Discord To...LI.exe
windows10-2004-x64
1Discord To...re.dll
windows7-x64
1Discord To...re.dll
windows10-2004-x64
1Discord To...er.dll
windows7-x64
1Discord To...er.dll
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 21:51
Static task
static1
Behavioral task
behavioral1
Sample
Discord Toolz/Discord.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Discord Toolz/Discord.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Discord Toolz/Utils/API's/Autoctu/main.py
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
Discord Toolz/Utils/API's/Autoctu/main.py
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Discord Toolz/Utils/API's/Resources/APIFOR.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Discord Toolz/Utils/API's/Resources/APIFOR.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
Discord Toolz/Utils/API's/Resources/Anarchy.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Discord Toolz/Utils/API's/Resources/Anarchy.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Discord Toolz/Utils/API's/Resources/BouncyCastle.Crypto.dll
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
Discord Toolz/Utils/API's/Resources/BouncyCastle.Crypto.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
Discord Toolz/Utils/API's/Resources/Newtonsoft.Json.dll
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
Discord Toolz/Utils/API's/Resources/Newtonsoft.Json.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
Discord Toolz/Utils/API's/Resources/UltraEmbeddable.exe
Resource
win7-20220901-en
Behavioral task
behavioral14
Sample
Discord Toolz/Utils/API's/Resources/UltraEmbeddable.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Discord Toolz/Utils/API's/bin/App.xml
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
Discord Toolz/Utils/API's/bin/App.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
Discord Toolz/Utils/API's/bin/Binaries/RtkBtManServ.exe
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
Discord Toolz/Utils/API's/bin/Binaries/RtkBtManServ.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
Discord Toolz/Utils/API's/bin/Program.js
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
Discord Toolz/Utils/API's/bin/Program.js
Resource
win10v2004-20220812-en
Behavioral task
behavioral21
Sample
Discord Toolz/Utils/API's/bin/Properties/Resources.Designer.vbs
Resource
win7-20220901-en
Behavioral task
behavioral22
Sample
Discord Toolz/Utils/API's/bin/Properties/Resources.Designer.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Discord Toolz/Utils/API's/bin/Properties/Resources.vbs
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
Discord Toolz/Utils/API's/bin/Properties/Resources.vbs
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
Discord Toolz/Utils/API's/bin/TOKEN STEALER CREATOR.csproj
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Discord Toolz/Utils/API's/bin/TOKEN STEALER CREATOR.csproj
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
Discord Toolz/Utils/API's/bin/obf/CLI.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
Discord Toolz/Utils/API's/bin/obf/CLI.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral29
Sample
Discord Toolz/Utils/API's/bin/obf/Confuser.Core.dll
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
Discord Toolz/Utils/API's/bin/obf/Confuser.Core.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
Discord Toolz/Utils/API's/bin/obf/Confuser.DynCipher.dll
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
Discord Toolz/Utils/API's/bin/obf/Confuser.DynCipher.dll
Resource
win10v2004-20220812-en
General
-
Target
Discord Toolz/Utils/API's/bin/App.xml
-
Size
184B
-
MD5
13ff21470b63470978e08e4933eb8e56
-
SHA1
3fa7077272c55e85141236d90d302975e3d14b2e
-
SHA256
16286566d54d81c3721f7ecf7f426d965de364e9be2f9e628d7363b684b6fe6a
-
SHA512
56d0e52874744df091ba8421eeda9c37854ece32a826bd251f74b88b6334df69736b8cd97104e6e7b2279ef01d2144fee100392744cc1afb7025ebbad5c307a8
Malware Config
Signatures
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0e41ecb27d5d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3391402031" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3375776430" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3375776430" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\IESettingSync IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987559" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30987559" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975fab978604b14697eb522259e91a10000000000200000000001066000000010000200000007c67c384beb57ae77184fe33687b99edc70c81004bf14692492028cc1077978b000000000e8000000002000020000000fd1446c0e717ce2a3a019806e183166410fb71c23c597f9439809c18c6e56579200000004751f7063c12afa1831d98ecbdda798d8c2671ef32bedc378d500734d89d0c3d400000002feeb1c49f01aff0c95f2cec3cff7941dda49ee00eaf2150793b41281345729287336f75617e205cecb40f8e101bc9d424ffab395c1be9c58d32676f535600f0 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{F482CED5-411A-11ED-89AC-5A10AEE59B4B} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30987559" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000975fab978604b14697eb522259e91a10000000000200000000001066000000010000200000005d6bd214659e37c3a37ce64334b18bbe20cb00ce18ace4571c1814a24863708b000000000e8000000002000020000000461e881a5dcc363f34814055aba9c753d8d6cf7857d7d3a43742bc4c9b0979bc2000000041a6faadaf86464f59b6403aa8240e562518025eae493184e687e7bf81ca8119400000005f21bd36beae638b23fa4cb388ae137ffcd1598bdb0d7d31d59493db318ea96c8c3af5a69e01083b940f65680743b705048dcad90e8915091ca9ec30ef58baef iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d03c2dcb27d5d801 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371346930" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2060 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2060 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2060 iexplore.exe 2060 iexplore.exe 4856 IEXPLORE.EXE 4856 IEXPLORE.EXE 4856 IEXPLORE.EXE 4856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
MSOXMLED.EXEiexplore.exedescription pid process target process PID 3576 wrote to memory of 2060 3576 MSOXMLED.EXE iexplore.exe PID 3576 wrote to memory of 2060 3576 MSOXMLED.EXE iexplore.exe PID 2060 wrote to memory of 4856 2060 iexplore.exe IEXPLORE.EXE PID 2060 wrote to memory of 4856 2060 iexplore.exe IEXPLORE.EXE PID 2060 wrote to memory of 4856 2060 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE"C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Discord Toolz\Utils\API's\bin\App.xml"1⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Discord Toolz\Utils\API's\bin\App.xml2⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2060 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
471B
MD5b471dd02d20e38a6695cf3cdb539ce96
SHA1d5006f272254f2639c3b7cd53a4a623aee592ac5
SHA256b6f5d3c2883398ddf4f651161f90a7c85469e1f9d764de6f8481845951d1d149
SHA512a8f8e19635caacf0ba160c9f502514542c9e785070aea3976be688dba8e1bb8a8b0483c286484d619451d47e3f3236bc9f44177d0f8ccd0c5a064f7aa890cf58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776Filesize
404B
MD5344c534962aafc1f4edb22720705259a
SHA13a3974732c8546b0fd1799fb0285899e7dcf930d
SHA25640738bab08e30310c71122347e2114ecaaa901bc7d3960f64acd101f4b708c4e
SHA5121d7cbb07e1b2651d4a252cfa3483c5bbc5778c0f54e87b9077f43f12b8b4a55f54551b672e3df6684e8395a9b6ffc7142f9ffc40cd53ff112f675476360f10fe
-
memory/3576-132-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-134-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-133-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-135-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-136-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-137-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-138-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-139-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB
-
memory/3576-140-0x00007FF8AE4F0000-0x00007FF8AE500000-memory.dmpFilesize
64KB