Analysis
-
max time kernel
222s -
max time network
284s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
07-07-2024 19:13
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win10-20240404-en
General
-
Target
passwords_grabber.pyc
-
Size
8KB
-
MD5
704dced7f7530b19a34a5f7a71c26b10
-
SHA1
608d9647488cfa2b5f84a891028168a973bfcfa9
-
SHA256
1fd284f1e27263bd2a16050c6989933a382c7d196f4c9f247187cc3b3f6ba3ac
-
SHA512
e4a6710abef2c45d631745c91d8135873be06e5b240a61362e341d05ecc1dedf885487a554b648c328a3c5cc17fcf74e6d066b2e3f51379358ba28c2a0f2f39f
-
SSDEEP
192:+CE34EAL/GFf/PomdPO23NsDmqFUhkxNivLI9dRvL:Y4EAL/AfRBO8NsxuOxNn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3572 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3296 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe 3296 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3296 wrote to memory of 3572 3296 OpenWith.exe 74 PID 3296 wrote to memory of 3572 3296 OpenWith.exe 74
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc1⤵
- Modifies registry class
PID:4364
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:3572
-