Resubmissions

13/07/2024, 22:40

240713-2lpmwszflm 3

13/07/2024, 22:15

240713-16l7tszamj 6

13/07/2024, 22:11

240713-14ed7syhnr 6

Analysis

  • max time kernel
    102s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 22:11

General

  • Target

    Discord-Account-Creator-main/source/discord/gen.py

  • Size

    2KB

  • MD5

    ab89e7549af0ec08589560cf15847f88

  • SHA1

    932dc48878907cc643753385a0b9828ac343a2dc

  • SHA256

    13c29939b838e877016644fc939344b8aeaa14c730970a584f4cf9461944c3fb

  • SHA512

    63d033ca2ecd9a3a3141959d9beeb5199a85e9683b2058162628c4cf2ab9124a291ead166dc18746233d19c8612ccb08c8ba358cf7f4b7036507f6c05a68595f

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Discord-Account-Creator-main\source\discord\gen.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Discord-Account-Creator-main\source\discord\gen.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Discord-Account-Creator-main\source\discord\gen.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:1532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    af3819bfd51d97701cedf9ee11faf7c9

    SHA1

    8d1541b489b233acca11b384c755745b7653f03f

    SHA256

    95eaab0c83fc28bd4cd0717933dd8def802e85232c3e5fb979a7da4a37285974

    SHA512

    4e1558bf1f653d2fb2911715209259a5d8ba7ae62d25af55898e78c2429b56d39595cf47ea70d46a43bc4cf2e2428e9da29a3f11bf5f9494859b3cb91fe5b442