Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-03-2024 21:47
Behavioral task
behavioral1
Sample
Tundra.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win11-20240221-en
General
-
Target
get_cookies.pyc
-
Size
9KB
-
MD5
9bdb8627dc166823e7d60603575b689a
-
SHA1
de56b5f8b3e891ad07760544132bd357f1e62368
-
SHA256
1078edad1660d103c2135793ea9707e4ef7877fb4be7b87c0e538ed84920212c
-
SHA512
789d21f744eff44456585fd27cd88a67e26b55ed1a043aa76a4b5e63f7dfad99013ca09b15fabecd041f8d35f8d22502c08efd0bb11d26ca083f02a64eae6d3a
-
SSDEEP
192:kNal3eiNis9QfUFoxJvm79F211G67+PtAhN:kJiB2lrj7jKlAhN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-4181651180-3163410697-3990547336-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 2984 Winword.exe 2984 Winword.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 5008 OpenWith.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe 2984 Winword.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5008 wrote to memory of 2984 5008 OpenWith.exe 84 PID 5008 wrote to memory of 2984 5008 OpenWith.exe 84
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc1⤵
- Modifies registry class
PID:1104
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2984
-