Resubmissions
04-07-2024 00:14
240704-aja8yatdpj 1004-07-2024 00:13
240704-ahtc5atdmp 1004-07-2024 00:12
240704-ag9cysvgma 1004-07-2024 00:05
240704-adjywstbnr 1003-07-2024 23:40
240703-3n1cvascrn 1003-07-2024 23:38
240703-3mqr1stere 10Analysis
-
max time kernel
125s -
max time network
221s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 23:40
Behavioral task
behavioral1
Sample
Lowkey/Lowkey/LowkeySpoofer.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
passwords_grabber.pyc
Resource
win10v2004-20240611-en
General
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
990bb1210323b8968b180576cf8114d6
-
SHA1
a4e11d7cdeb37fb32d768085263ff9fd4e51ac0b
-
SHA256
b4a60b0e4f82707a8c5fb7f3fc0cc78576c7b45217617185ab34a90e2e052208
-
SHA512
43d1e9db58d160b15d6daf5677f2f63ed8f3fa494a886bf07d229829ffc84af17f9c81f61bdbf23dfa54a1bebafa7e562f805848b64de08bc8cf83fe98a2188a
-
SSDEEP
384:YGC7RYmnXavkxzG7WltcrhntQ5saa2h12VA:YGCuvk8WltcrttQ5saaCsVA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.pyc OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\.pyc\ = "pyc_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell\open\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell\edit OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell\edit\command OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell\edit\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell\open OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\pyc_auto_file\shell\open\command\ = "%SystemRoot%\\system32\\NOTEPAD.EXE %1" OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1964 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2116 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe 2116 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2116 wrote to memory of 1964 2116 OpenWith.exe 91 PID 2116 wrote to memory of 1964 2116 OpenWith.exe 91
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Modifies registry class
PID:1380
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3768,i,14486271492189381216,15799931579469722648,262144 --variations-seed-version --mojo-platform-channel-handle=4116 /prefetch:81⤵PID:2400