Overview
overview
10Static
static
10Rino's Dis...xe.xml
windows7-x64
1Rino's Dis...xe.xml
windows10-1703-x64
1Rino's Dis...xe.xml
windows10-2004-x64
1Rino's Dis...xe.xml
windows11-21h2-x64
1Rino's Dis...it.pdb
windows7-x64
3Rino's Dis...it.pdb
windows10-1703-x64
3Rino's Dis...it.pdb
windows10-2004-x64
3Rino's Dis...it.pdb
windows11-21h2-x64
3Rino's Dis...it.exe
windows7-x64
7Rino's Dis...it.exe
windows10-1703-x64
10Rino's Dis...it.exe
windows10-2004-x64
7Rino's Dis...it.exe
windows11-21h2-x64
7�l˷��&.pyc
windows7-x64
�l˷��&.pyc
windows10-1703-x64
�l˷��&.pyc
windows10-2004-x64
�l˷��&.pyc
windows11-21h2-x64
Rino's Dis...it.exe
windows7-x64
10Rino's Dis...it.exe
windows10-1703-x64
10Rino's Dis...it.exe
windows10-2004-x64
10Rino's Dis...it.exe
windows11-21h2-x64
10Analysis
-
max time kernel
3s -
max time network
28s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
14/03/2024, 10:25
Behavioral task
behavioral1
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.exe.xml
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.exe.xml
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.exe.xml
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.exe.xml
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.pdb
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.pdb
Resource
win10-20240221-en
Behavioral task
behavioral7
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.pdb
Resource
win10v2004-20240226-en
Behavioral task
behavioral8
Sample
Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.pdb
Resource
win11-20240221-en
Behavioral task
behavioral9
Sample
Rino's Discord Account ToolKit/Rino's Discord Acount toolkit.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Rino's Discord Account ToolKit/Rino's Discord Acount toolkit.exe
Resource
win10-20240221-en
Behavioral task
behavioral11
Sample
Rino's Discord Account ToolKit/Rino's Discord Acount toolkit.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
Rino's Discord Account ToolKit/Rino's Discord Acount toolkit.exe
Resource
win11-20240221-en
Behavioral task
behavioral13
Sample
�l˷��&.pyc
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
�l˷��&.pyc
Resource
win10-20240221-en
Behavioral task
behavioral15
Sample
�l˷��&.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral16
Sample
�l˷��&.pyc
Resource
win11-20240214-en
Behavioral task
behavioral17
Sample
Rino's Discord Account ToolKit/Rinos_Discord_Account_ToolKit.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Rino's Discord Account ToolKit/Rinos_Discord_Account_ToolKit.exe
Resource
win10-20240221-en
Behavioral task
behavioral19
Sample
Rino's Discord Account ToolKit/Rinos_Discord_Account_ToolKit.exe
Resource
win10v2004-20240226-en
General
-
Target
Rino's Discord Account ToolKit/Rinos_Discord_Account_ToolKit.exe
-
Size
4.3MB
-
MD5
a7553cc8ad2b91025f5bfb532090d2b6
-
SHA1
5326aeb29d57118faaad3af9946584b87ad7f0d0
-
SHA256
6aeee8b13c11c4157a2a92a38270c30af85fb060e5ccf3ef54994d2c3a1cf5b4
-
SHA512
1a62dec71262fcf6561cf6ea615f9cb0a4d9d495e8759ab62b5980f6ad4211effce2e3f0726e69afb55441999e264ea25512db0e6d584d4c7e3c949429c9b81c
-
SSDEEP
98304:XIPanxb7sGW9NcEJn5kKxGOd82SqTxaA/XjOqC1kIq9o8ha:Ys7sGqNcLGGOJSeV7L9o
Malware Config
Extracted
xworm
3.1
-
install_file
game.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral18/memory/4948-8-0x0000023728740000-0x0000023728790000-memory.dmp family_xworm behavioral18/files/0x000800000001ab07-7.dat family_xworm behavioral18/memory/4948-26-0x000002372A300000-0x000002372A314000-memory.dmp family_xworm -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelCpHDCPSvc.exe Rinos_Discord_Account_ToolKit.exe -
Executes dropped EXE 2 IoCs
pid Process 4948 IntelCpHDCPSvc.exe 4804 Rino's Discord Account ToolKit.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4948 IntelCpHDCPSvc.exe Token: SeDebugPrivilege 4948 IntelCpHDCPSvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4948 4796 Rinos_Discord_Account_ToolKit.exe 72 PID 4796 wrote to memory of 4948 4796 Rinos_Discord_Account_ToolKit.exe 72 PID 4796 wrote to memory of 4804 4796 Rinos_Discord_Account_ToolKit.exe 73 PID 4796 wrote to memory of 4804 4796 Rinos_Discord_Account_ToolKit.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rino's Discord Account ToolKit\Rinos_Discord_Account_ToolKit.exe"C:\Users\Admin\AppData\Local\Temp\Rino's Discord Account ToolKit\Rinos_Discord_Account_ToolKit.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelCpHDCPSvc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelCpHDCPSvc.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\IntelCpHDCPSvc.exe'3⤵PID:4492
-
-
-
C:\TOOLS\Rino's Discord Account ToolKit.exe"C:\TOOLS\Rino's Discord Account ToolKit.exe"2⤵
- Executes dropped EXE
PID:4804
-
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{3cd6e95c-73b4-4104-898e-76ffd0b6398f}1⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD53d286f72d5f76083035d71b63312bdcf
SHA1a60ce64eb8b99eb1937dea4ded872e596acdf8a9
SHA256b94bdc69fce96ab13e6068c6af544c9fcee44bec0b960624ca629aea295fee3b
SHA512459037fef413c20bd51837aa75b34ae5919faeffb790fc70c73d957c1ae3c63f0f2d7b0cc7c6f2ca76d58dd31be3e52a7b9868c645f7207e6f56092f0d779a0b
-
Filesize
116KB
MD54b8fda586088860c2514b4c4fd4d8de4
SHA166a3dfd3ae4fdb2f9f8584db88d2dd95802cb480
SHA2564c15e794d2ebe8dd14a871070ec010351b19fbce817dae2b116eff1b372a7d08
SHA51266224b0543616e5a2eb6cb3e9f2d793d89bca8da633e7e02852c3df1ded78f7ea455dfb3d876007e4aa0dfd1d99eccca80350c3e7524256839e2324f00ccc027
-
Filesize
301KB
MD534613dee8aeb37cf39ea63ce5fdb47ea
SHA1c0c5816551614719bb79b7fc5f0092f3c6e50f6f
SHA2569a14d4f1fc797330557379e7fdec808cd3ef0ba5d372c02f8ce37a86b8bed214
SHA5120d11526487843c62fe0edf3fbba413ac6c035e8b3ce8d47f878daf9ab39e45aae4d7108e4a1652da144b8af6c38c20df354fd34850df51943748f6c21e7f36e2