Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    17/11/2023, 03:05

General

  • Target

    Rose-Grabber-main/resources/source/bin/discordc.py

  • Size

    11KB

  • MD5

    33050ff0819c5c6929a6c8e85f7e99d4

  • SHA1

    a66d99370be781a439a8b6159464cfff53e810b6

  • SHA256

    c53bc6c1e889e72302a9a3e10bd37ee11579f0c2d69fbdf29210ab30b37203c9

  • SHA512

    62f69cfeeb82fb4bf3d048abec9c69f7a1ab458235327a3cf3de47f38bd990e9746c894b8c0c30264b68d81c59534dfd26b227d7c4c52fb8fc00171f0e4287a8

  • SSDEEP

    192:317YRJaBCYPDy8YRNldcPCYRwafnYRDj/vRVZfp24SnP:F7CJawYPDy8CNldcPCCwOCDlVZfM

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Rose-Grabber-main\resources\source\bin\discordc.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Rose-Grabber-main\resources\source\bin\discordc.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Rose-Grabber-main\resources\source\bin\discordc.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    0724fc0da5a581e18916a91ad33934dc

    SHA1

    852fed3b7a0952173a92aa511cbc12e79ab14c55

    SHA256

    c93240a9da76b9c81779a28e78fe47c95884cfac05c41992e2334eb3e31befed

    SHA512

    42591f3648933b80c41648512a0b7d88ec24f0ec15bb97c25a34d75ee790f92c70a3cc7b727301faa05f9efb5fd96e9464aad191a02333752c860e08fd659db5