Resubmissions

13/07/2024, 22:40

240713-2lpmwszflm 3

13/07/2024, 22:15

240713-16l7tszamj 6

13/07/2024, 22:11

240713-14ed7syhnr 6

Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13/07/2024, 22:11

General

  • Target

    Discord-Account-Creator-main/main.py

  • Size

    376B

  • MD5

    3df0db35727161ead4c87001e7fd2fed

  • SHA1

    305c97f361987e2868628ed2232b10a248474366

  • SHA256

    72e58de2db2af0e0f4f49d3317fbc696fba222b688e8f9b8c9ac11aaf5a609d5

  • SHA512

    80a67e206e146b15d71182d7ed89126cf0eefbc57f029436218e80033cb66b7ad25ef747f9864460d32bb4b0a1ec634bf8fdd4ef9d5798246dd92dbe53819684

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Discord-Account-Creator-main\main.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Discord-Account-Creator-main\main.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Discord-Account-Creator-main\main.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2636

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          2ca3380673f05e3abb7e7cd6f0ef8532

          SHA1

          c3903266dcabf05bf056f5ac3e3bb3cb80a4ffde

          SHA256

          bc0ff968109fc9bcd312596a1dcfc78419e7649ce3d154169f51b8310c23c7b3

          SHA512

          fff1b1d70b443b79efa935c6e4e9d49a221b18fc635b4fd63fd604f0e2c65cb8f9441744932a27246f18b7caa1966df198c80753b31a97e1f6a80c6d1bf67ebd