Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-03-2024 21:47
Behavioral task
behavioral1
Sample
Tundra.exe
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win11-20240214-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win11-20240221-en
General
-
Target
source_prepared.pyc
-
Size
173KB
-
MD5
5c5c245811c2c529f135d9859a64124e
-
SHA1
14cebdf0a52b6b487cbf763906c3b23c62a497b4
-
SHA256
db752a1647076f06b97da5fc46d50b46645442ec16143520d8fe72d65dc94349
-
SHA512
8ef08ac3fb8737086c8a01482d3844a484cc225b8c73f6fac574ce47b113f70f1ac469f7cf32949bd01377e538bf4e174be8fd2fbd2e41c5c24369b9654d72e2
-
SSDEEP
3072:+r8XW0aOO2v71+ayFoLPZTJ0pZyScWaQV+lHvIvdXzysTWu:+r8XW0aOO2v7qFocpL9ElzsP
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Winword.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-627134735-902745853-4257352768-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-627134735-902745853-4257352768-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3640 Winword.exe 3640 Winword.exe -
Suspicious use of SetWindowsHookEx 24 IoCs
pid Process 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 2108 OpenWith.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe 3640 Winword.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3640 2108 OpenWith.exe 87 PID 2108 wrote to memory of 3640 2108 OpenWith.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc1⤵
- Modifies registry class
PID:3240
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Program Files\Microsoft Office\root\Office16\Winword.exe"C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"2⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3640
-