Analysis
-
max time kernel
35s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 01:50
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/bhanu1598/Discord-Token-Grabber/releases/tag/Release
Resource
win10v2004-20231222-en
General
-
Target
https://github.com/bhanu1598/Discord-Token-Grabber/releases/tag/Release
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000_Classes\Local Settings msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 1356 msedge.exe 1356 msedge.exe 3484 identity_helper.exe 3484 identity_helper.exe 5056 msedge.exe 5056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe 1356 msedge.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4192 grabber.exe 4352 grabber.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1356 wrote to memory of 3892 1356 msedge.exe 83 PID 1356 wrote to memory of 3892 1356 msedge.exe 83 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 5088 1356 msedge.exe 84 PID 1356 wrote to memory of 2552 1356 msedge.exe 85 PID 1356 wrote to memory of 2552 1356 msedge.exe 85 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86 PID 1356 wrote to memory of 1556 1356 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/bhanu1598/Discord-Token-Grabber/releases/tag/Release1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe5b0346f8,0x7ffe5b034708,0x7ffe5b0347182⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3743766670539932093,11765923211030136784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:2556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1920
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4076
-
C:\Users\Admin\Downloads\Release\Release\grabber.exe"C:\Users\Admin\Downloads\Release\Release\grabber.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4192
-
C:\Users\Admin\Downloads\Release\Release\grabber.exe"C:\Users\Admin\Downloads\Release\Release\grabber.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e71d66ce903fcba6050e4b99b624fa7
SHA1139d274762405b422eab698da8cc85f405922de5
SHA25653b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3
SHA51217e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD58b9d85a0de93f8bbb259961070d394df
SHA1375213c30a377f4d3c24c8cef8135e3ae48eb66b
SHA256fcc639091688b1cd43e6019a1fa5fd637b5aabf32c2fdafad19f5723cedf6650
SHA512996f85ac2301b07043c26af6209f04c5c901b2e28cf3facddb5c60535071441ae531452de09fc8f983f580fc06ed80c93f695df02b616c0baef56f215a7de13c
-
Filesize
5KB
MD545a5fbc661078695c47bb293cd9e6ff5
SHA11cb1612724b5bae39d2aa63619e5503336214325
SHA2562d9ac475406bd0384a2d01678590580abeaa580ae34d156d9d141436b2d98c6b
SHA51256bd7a7649b36044e4288a03481e7536236e4931b7e4357a33942bcdd2ddb7dab3115edb939476bd5a9d4c1b6ce4f09b90978c812f1a35894d1de0572bb08df7
-
Filesize
5KB
MD55cc9da2202d04e5bc1ab80b7316fdbf1
SHA1d003a0f8c73be3ceca24240f14b82995ab7557b6
SHA256f8eea34267c8140c33340234b61b90e8f115be0f23c04b53af356d47eef4fe7b
SHA5127bb15f9eea1d6999b97708ad5f1a973e7c8de7f3964d5e68fe3e0711a9996c02e6e6f0bd23bfc7973cd5efeef219fea54b226dd3278a47e24ed707153e90c99e
-
Filesize
6KB
MD5e73a013f4c8f05a9521966df7599bd6b
SHA1b03252d44422cf73a767d6a90294e6f3efa13c80
SHA2560ba86f0c78cb8a6f4a56b9d6c0359f6698ce1f533d494c8c6afba2bde0bf532b
SHA51260596e65b4e33c4bc47d0d05b10a9eb815b77281a4f7b3c897a2d54725a3a9c67ebe85d7f99a2bc016825b328d783c04071e75ad0afb6866b73a723da72bc061
-
Filesize
24KB
MD51b1b142e24215f033793d1311e24f6e6
SHA174e23cffbf03f3f0c430e6f4481e740c55a48587
SHA2563dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1
SHA512a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59f29dbf0a61b6ba0b3c3eb0f50d652cd
SHA13ed8e772f2579daf483f94488a23dca111de95ed
SHA256d9ddd863299d363ef9c7f6f7bdcec8ac40d6793d1351fb8ba65334824fc76ceb
SHA512729f40457717d92b81203cd5d94455810f9cb71f6c3da89ea9de2d76353b6c0ea95a4d449a7d9e75b00b57bca79a943ea27adebf4a40b8af17efb6e2fa400521
-
Filesize
10KB
MD5a068c35189dc5453bd48769510e7a243
SHA14eb1f9610d578d6c51b5679c57954183d2036bf5
SHA2568351eea353dddbaf05baf05de22b613e5c40661541d8e0f7199f04a4bddab2b2
SHA512c8e9b59fc178e2eb92d916811827a909d89618177360fbd25becc44227748389582ce5f26447ca70bf15302a8a458b32d5ca1657ec0f0f8f714c916c3ff6e293
-
Filesize
447KB
MD5b5308b1a23ed32ed74c247cd7a33092c
SHA174edae45af7d5bafd6aa3d33a60bb789a2168a50
SHA256c2311800164bfcba83c1569c631d984d5fcfe0790b3c8b00358e76a62effc412
SHA51202711361cfd0a9d439d793e0d4e41821acef8457308aabdd14cb0d17eb5fa9aa88f76aba593ead00e3a7d86ae903b5044ab24278bf531e949b9ea870271b9189