Analysis
-
max time kernel
135s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-es -
resource tags
arch:x64arch:x86image:win7-20230220-eslocale:es-esos:windows7-x64systemwindows -
submitted
24-03-2023 03:48
Behavioral task
behavioral1
Sample
DiscordGen.exe
Resource
win7-20230220-es
Behavioral task
behavioral2
Sample
DiscordGen.exe
Resource
win10v2004-20230221-es
General
-
Target
DiscordGen.exe
-
Size
74.3MB
-
MD5
ab36d926c9498779e504ebc1822c93cf
-
SHA1
939aaa646b008a530ee2402d00cb7d019cba24ac
-
SHA256
7d4eb3b7e03d744bebcc760d11fbadbe6d003afa4c1f5e6a3e3b7c0bbd0cd86a
-
SHA512
8692474b784ac99350a4d5720de2982851e1422029d91087a9ba326ab6956c54b8d076d556bb34f1912bcac2eeb9952ddb6c19bc265e68bc67002bf01a2dc76c
-
SSDEEP
1572864:dWb1aVguBLaKQ3t9aAaWv/OHzDCd5cBCWB2mOLWBPQo:QJDuBLaKJAaZnCdWR2HO
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 984 DiscordGen.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 984 DiscordGen.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 924 wrote to memory of 984 924 DiscordGen.exe 28 PID 924 wrote to memory of 984 924 DiscordGen.exe 28 PID 924 wrote to memory of 984 924 DiscordGen.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordGen.exe"C:\Users\Admin\AppData\Local\Temp\DiscordGen.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\DiscordGen.exe"C:\Users\Admin\AppData\Local\Temp\DiscordGen.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:984
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4
-
Filesize
5.5MB
MD51fe47c83669491bf38a949253d7d960f
SHA1de5cc181c0e26cbcb31309fe00d9f2f5264d2b25
SHA2560a9f2c98f36ba8974a944127b5b7e90e638010e472f2eb6598fc55b1bda9e7ae
SHA51205cc6f00db128fbca02a14f60f86c049855f429013f65d91e14ea292d468bf9bfdeebc00ec2d54a9fb5715743a57ae3ab48a95037016240c02aabe4bfa1a2ff4