Resubmissions

14/03/2024, 10:26

240314-mgrjcsbh52 10

14/03/2024, 10:25

240314-mfxc8ahe7z 10

Analysis

  • max time kernel
    7s
  • max time network
    3s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14/03/2024, 10:25

General

  • Target

    Rino's Discord Account ToolKit/Rino's Discord Account ToolKit.exe.xml

  • Size

    798B

  • MD5

    507dc469ba6375912a430e71a6cf170d

  • SHA1

    dbed5ada57b013e955b5a1224f001688a5382a84

  • SHA256

    9ddb28bd07df5784cd6b11f632f7d862f31593af848e1feb7700020ff96984d8

  • SHA512

    f43dc12cd0f9228b8ac326d4b2eb61beb48c5df5cc4f714b8ba2e8e6dfa17e49da291b0653b37989588c82b743bd77d71ceafe21e46370a6bc1170cfdd5c3b5e

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 29 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
    "C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Rino's Discord Account ToolKit\Rino's Discord Account ToolKit.exe.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Rino's Discord Account ToolKit\Rino's Discord Account ToolKit.exe.xml
      2⤵
      • Modifies Internet Explorer settings
      PID:1184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-1-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-3-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-4-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-5-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-2-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-6-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-7-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-8-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-9-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-10-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-11-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-12-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-13-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-14-0x00007FFC02760000-0x00007FFC0281D000-memory.dmp

    Filesize

    756KB

  • memory/2204-15-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB

  • memory/2204-17-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-16-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-19-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-18-0x00007FFC02760000-0x00007FFC0281D000-memory.dmp

    Filesize

    756KB

  • memory/2204-20-0x00007FFC02760000-0x00007FFC0281D000-memory.dmp

    Filesize

    756KB

  • memory/2204-21-0x00007FFBC4190000-0x00007FFBC41A0000-memory.dmp

    Filesize

    64KB

  • memory/2204-22-0x00007FFC04100000-0x00007FFC04309000-memory.dmp

    Filesize

    2.0MB