Overview
overview
8Static
static
1discord-se...ain.py
windows7-x64
3discord-se...ain.py
windows10-2004-x64
3discord-se...ner.py
windows7-x64
3discord-se...ner.py
windows10-2004-x64
3discord-se...ion.py
windows7-x64
3discord-se...ion.py
windows10-2004-x64
3discord-se...ger.py
windows7-x64
3discord-se...ger.py
windows10-2004-x64
3discord-se...ter.py
windows7-x64
3discord-se...ter.py
windows10-2004-x64
3discord-se...rt.bat
windows7-x64
1discord-se...rt.bat
windows10-2004-x64
8Resubmissions
03/02/2024, 09:57
240203-lyzqmaefd3 803/02/2024, 09:53
240203-lw3dqshaek 803/02/2024, 09:53
240203-lwp4eahadn 3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
discord-server-copy-main/main.py
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
discord-server-copy-main/main.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
discord-server-copy-main/modules/cloner.py
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
discord-server-copy-main/modules/cloner.py
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
discord-server-copy-main/modules/configuration.py
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
discord-server-copy-main/modules/configuration.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
discord-server-copy-main/modules/logger.py
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
discord-server-copy-main/modules/logger.py
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
discord-server-copy-main/modules/updater.py
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
discord-server-copy-main/modules/updater.py
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
discord-server-copy-main/start.bat
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
discord-server-copy-main/start.bat
Resource
win10v2004-20231222-en
General
-
Target
discord-server-copy-main/modules/logger.py
-
Size
2KB
-
MD5
ab462239f2c0456d99a5c4c0f3648b0d
-
SHA1
c57af62f5dceb2a685aab0952c3200cbc49cf34e
-
SHA256
9fa088e6110ed5444ac464e01286e5929abdf7cd16ea4c0125a6118cc7b55492
-
SHA512
c0dac18ba13294d5fc1a19618008deb66ec2a4364a631bd68ed3e29f75e59399dde260f78c51a2ae8499b2c7fdd380b065e029954f667329f732a4f2d26220b4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2688 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2688 AcroRd32.exe 2688 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2416 wrote to memory of 2704 2416 cmd.exe 29 PID 2416 wrote to memory of 2704 2416 cmd.exe 29 PID 2416 wrote to memory of 2704 2416 cmd.exe 29 PID 2704 wrote to memory of 2688 2704 rundll32.exe 30 PID 2704 wrote to memory of 2688 2704 rundll32.exe 30 PID 2704 wrote to memory of 2688 2704 rundll32.exe 30 PID 2704 wrote to memory of 2688 2704 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord-server-copy-main\modules\logger.py1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord-server-copy-main\modules\logger.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord-server-copy-main\modules\logger.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5df28a9c6f83b39b639d50e49a8bbe35d
SHA17c64da36b3793e0ef778650a30299acb42e09c0a
SHA25629df951d73a28b823c4a5a5d4479521fa7350e5e157984cfe566641cc1058fee
SHA5126f55f2910e4ffaa6d92c2956e08e7bba36f83c13e4f9fe50e98c041631c5def29a94d26c234188478632611c15c35a21eaa629f04457b32402575aac6ab1c48f