Resubmissions
04-07-2024 00:14
240704-aja8yatdpj 1004-07-2024 00:13
240704-ahtc5atdmp 1004-07-2024 00:12
240704-ag9cysvgma 1004-07-2024 00:05
240704-adjywstbnr 1003-07-2024 23:40
240703-3n1cvascrn 1003-07-2024 23:38
240703-3mqr1stere 10Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 00:14
Behavioral task
behavioral1
Sample
Lowkey_Spoofer.zip
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
Lowkey/Lowkey/LowkeySpoofer.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240611-en
Behavioral task
behavioral4
Sample
get_cookies.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
misc.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
passwords_grabber.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
source_prepared.pyc
Resource
win10v2004-20240611-en
General
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
990bb1210323b8968b180576cf8114d6
-
SHA1
a4e11d7cdeb37fb32d768085263ff9fd4e51ac0b
-
SHA256
b4a60b0e4f82707a8c5fb7f3fc0cc78576c7b45217617185ab34a90e2e052208
-
SHA512
43d1e9db58d160b15d6daf5677f2f63ed8f3fa494a886bf07d229829ffc84af17f9c81f61bdbf23dfa54a1bebafa7e562f805848b64de08bc8cf83fe98a2188a
-
SSDEEP
384:YGC7RYmnXavkxzG7WltcrhntQ5saa2h12VA:YGCuvk8WltcrttQ5saaCsVA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4336 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe 3404 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3404 wrote to memory of 4336 3404 OpenWith.exe 93 PID 3404 wrote to memory of 4336 3404 OpenWith.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Modifies registry class
PID:3684
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:4336
-