Malware Analysis Report

2024-11-13 15:21

Sample ID 240730-bn9gzazhmk
Target DW_Reynolds_Alpha_V1.07.exe
SHA256 9acd6adce129806682ec02315eec146bb0a6d999e43f00b4c2f8f0d60cb32cfd
Tags
discovery pyinstaller pysilon evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral8

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral11

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral12

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral9

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral10

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9acd6adce129806682ec02315eec146bb0a6d999e43f00b4c2f8f0d60cb32cfd

Threat Level: Known bad

The file DW_Reynolds_Alpha_V1.07.exe was found to be: Known bad.

Malicious Activity Summary

discovery pyinstaller pysilon evasion execution persistence

Pysilon family

Detect Pysilon

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Detects Pyinstaller

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

Kills process with taskkill

Views/modifies file attributes

Suspicious use of AdjustPrivilegeToken

Modifies registry class

Suspicious use of SetWindowsHookEx

Suspicious behavior: GetForegroundWindowSpam

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-30 01:18

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral8

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win10v2004-20240709-en

Max time kernel

138s

Max time network

150s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp

Files

N/A

Analysis: behavioral11

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win7-20240708-en

Max time kernel

117s

Max time network

122s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 e0a08fdc577e63f1f74ea75adc05092e
SHA1 d8bb79a5cf2e0f68e17bce5eaeb9ffd51128c7d5
SHA256 c4a2c9c018240c8a590e3a3452eab8172eaa9fe334b988784dd7001044246a72
SHA512 92a24d636152d2bdc52fe51e1d6425b0af6a4d0fc3656cd85514cf4d1f84a20d9e60f5a3270823446e1dac0145618887edc914ff184a235f351e74fd68ba5b0a

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:20

Platform

win7-20240708-en

Max time kernel

22s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe

"C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe"

C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe

"C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI13002\ucrtbase.dll

MD5 988755316d0f77fc510923c2f7cd6917
SHA1 ccd23c30c38062c87bf730ab6933f928ee981419
SHA256 1854cd0f850da28835416e3b69ed6dae465df95f8d84e77adbbc001f6dbd9d78
SHA512 8c52210a919d9f2856f38bd6a59bbc039506650a7e30f5d100a5aa5008641707122ff79f6f88c268c9abc9f02ba2792eed6aad6a5c65891a9ce7d6d5f12c3b0a

C:\Users\Admin\AppData\Local\Temp\_MEI13002\api-ms-win-core-file-l1-2-0.dll

MD5 ac28edb5ad8eaa70ecbc64baf3e70bd4
SHA1 1a594e6cdc25a6e6be7904093f47f582e9c1fe4d
SHA256 fbd5e958f6efb4d78fd61ee9ee4b4d1b6f43c1210301668f654a880c65a1be86
SHA512 a25b812b9fa965af5f7de5552e2c2f4788a076af003ac0d94c3b2bc42dd9ab7e69af2438ce349b46a3387bf2bfcf27cec270d90ca6a44c9690861331c9e431e1

C:\Users\Admin\AppData\Local\Temp\_MEI13002\api-ms-win-core-localization-l1-2-0.dll

MD5 fd59ee6be2136782225dcd86f8177239
SHA1 494d20e04f69676c150944e24e4fa714a3f781ca
SHA256 1fd044fdbc424779b01b79d477ee79dfbb508a04e86c62e1c8fc4f6d22f6a16a
SHA512 2250d54c3b9e6aeb2f5406e1428536564357a48ceab51596b33ff0843086fb420ad886af61725b25a58e2f50a4c17ddee10696d6041db9b60891eff8e495775c

C:\Users\Admin\AppData\Local\Temp\_MEI13002\api-ms-win-core-processthreads-l1-1-1.dll

MD5 8ff0692d32f2fcb0b417220b98f30364
SHA1 5eeb1d781d44e4885284c8b535f051efca64aef8
SHA256 53cea73c248a49389bc2da01acac1d8e8022a7e034bcd522306e43a937200897
SHA512 f73249f70953c537da02b890308cb18a9c6676401975bf13aeb61b1db9dfa042e908c52ee266b404948a568b23b0cfb37ecd4b80379c398c15f56ce7a82cf7a5

C:\Users\Admin\AppData\Local\Temp\_MEI13002\python311.dll

MD5 387bb2c1e40bde1517f06b46313766be
SHA1 601f83ef61c7699652dec17edd5a45d6c20786c4
SHA256 0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512 521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad

\Users\Admin\AppData\Local\Temp\_MEI13002\api-ms-win-core-file-l2-1-0.dll

MD5 b5832f1e3a18d94cd855c3d8c632b30d
SHA1 6315b40487078bbafb478786c42c3946647e8ef3
SHA256 9f096475d4ba1533f564dd4a1db5dfeb620248fe14518042094b922539dc13e3
SHA512 f3016ded97591e25a6d4c70d89251a331402455ab589604e55c486fec37ee8e96bd1be2d4e4e59ba102dad696b3e1f754b699f9ebe8ae462e8b958ed2d431a5b

\Users\Admin\AppData\Local\Temp\_MEI13002\api-ms-win-core-timezone-l1-1-0.dll

MD5 863ed806b4f16be984b4f1e279a1f99b
SHA1 b9a919216ef90064ac66b12ccde6b3bf1f334ee8
SHA256 171ca9df2b9ecfa545748af724c1c56ab396b299503a14c4da2197b0e5a44401
SHA512 fb8f195d9a1885c16aa2cc6eff38e627ea127b18978016d6046dc0120a19ab40cc4fe4b799c06f133b02f7cd6a634ae1665f05f9be5fcae609229dfaae0ce478

Analysis: behavioral2

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win10v2004-20240709-en

Max time kernel

148s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe N/A
N/A N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Dragon Wagon = "C:\\Users\\Admin\\Dragon Wagon\\Dragon Wagon.exe" C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4372 wrote to memory of 2100 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe
PID 4372 wrote to memory of 2100 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe
PID 2100 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Windows\system32\cmd.exe
PID 2100 wrote to memory of 3920 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Windows\system32\cmd.exe
PID 2100 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2100 wrote to memory of 4048 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2100 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Windows\system32\cmd.exe
PID 2100 wrote to memory of 1612 N/A C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe C:\Windows\system32\cmd.exe
PID 1612 wrote to memory of 4432 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 1612 wrote to memory of 4432 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 1612 wrote to memory of 2124 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe
PID 1612 wrote to memory of 2124 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe
PID 1612 wrote to memory of 6724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 1612 wrote to memory of 6724 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2124 wrote to memory of 4140 N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe
PID 2124 wrote to memory of 4140 N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe
PID 4140 wrote to memory of 924 N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe C:\Windows\system32\cmd.exe
PID 4140 wrote to memory of 924 N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe C:\Windows\system32\cmd.exe
PID 4140 wrote to memory of 4756 N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4140 wrote to memory of 4756 N/A C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe

"C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe"

C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe

"C:\Users\Admin\AppData\Local\Temp\DW_Reynolds_Alpha_V1.07.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Dragon Wagon\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Dragon Wagon\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe

"Dragon Wagon.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "DW_Reynolds_Alpha_V1.07.exe"

C:\Users\Admin\Dragon Wagon\Dragon Wagon.exe

"Dragon Wagon.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Dragon Wagon\""

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.138.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp
N/A 127.0.0.1:53204 tcp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 104.193.132.51.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI43722\ucrtbase.dll

MD5 988755316d0f77fc510923c2f7cd6917
SHA1 ccd23c30c38062c87bf730ab6933f928ee981419
SHA256 1854cd0f850da28835416e3b69ed6dae465df95f8d84e77adbbc001f6dbd9d78
SHA512 8c52210a919d9f2856f38bd6a59bbc039506650a7e30f5d100a5aa5008641707122ff79f6f88c268c9abc9f02ba2792eed6aad6a5c65891a9ce7d6d5f12c3b0a

C:\Users\Admin\AppData\Local\Temp\_MEI43722\python311.dll

MD5 387bb2c1e40bde1517f06b46313766be
SHA1 601f83ef61c7699652dec17edd5a45d6c20786c4
SHA256 0817a2a657a24c0d5fbb60df56960f42fc66b3039d522ec952dab83e2d869364
SHA512 521cde6eaa5d4a2e0ef6bbfdea50b00750ae022c1c7bd66b20654c035552b49c9d2fac18ef503bbd136a7a307bdeb97f759d45c25228a0bf0c37739b6e897bad

C:\Users\Admin\AppData\Local\Temp\_MEI43722\base_library.zip

MD5 bec1bfd6f5c778536e45ff0208baeeb8
SHA1 c6d20582764553621880c695406e8028bab8d49e
SHA256 a9d7fa44e1cc77e53f453bf1ca8aba2a9582a842606a4e182c65b88b616b1a17
SHA512 1a684f5542693755e8ca1b7b175a11d8a75f6c79e02a20e2d6433b8803884f6910341555170441d2660364596491e5b54469cfd16cb04a3790128450cd2d48fe

C:\Users\Admin\AppData\Local\Temp\_MEI43722\_ctypes.pyd

MD5 565d011ce1cee4d48e722c7421300090
SHA1 9dc300e04e5e0075de4c0205be2e8aae2064ae19
SHA256 c148292328f0aab7863af82f54f613961e7cb95b7215f7a81cafaf45bd4c42b7
SHA512 5af370884b5f82903fd93b566791a22e5b0cded7f743e6524880ea0c41ee73037b71df0be9f07d3224c733b076bec3be756e7e77f9e7ed5c2dd9505f35b0e4f5

C:\Users\Admin\AppData\Local\Temp\_MEI43722\python3.DLL

MD5 7e07c63636a01df77cd31cfca9a5c745
SHA1 593765bc1729fdca66dd45bbb6ea9fcd882f42a6
SHA256 db84bc052cfb121fe4db36242ba5f1d2c031b600ef5d8d752cf25b7c02b6bac6
SHA512 8c538625be972481c495c7271398993cfe188e2f0a71d38fb51eb18b62467205fe3944def156d0ff09a145670af375d2fc974c6b18313fa275ce6b420decc729

C:\Users\Admin\AppData\Local\Temp\_MEI43722\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI43722\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

C:\Users\Admin\AppData\Local\Temp\_MEI43722\_bz2.pyd

MD5 aa1083bde6d21cabfc630a18f51b1926
SHA1 e40e61dba19301817a48fd66ceeaade79a934389
SHA256 00b8ca9a338d2b47285c9e56d6d893db2a999b47216756f18439997fb80a56e3
SHA512 2df0d07065170fee50e0cd6208b0cc7baa3a295813f4ad02bec5315aa2a14b7345da4cdf7cac893da2c7fc21b201062271f655a85ceb51940f0acb99bb6a1d4c

C:\Users\Admin\AppData\Local\Temp\_MEI43722\_lzma.pyd

MD5 b86b9f292af12006187ebe6c606a377d
SHA1 604224e12514c21ab6db4c285365b0996c7f2139
SHA256 f5e01b516c2c23035f7703e23569dec26c5616c05a929b2580ae474a5c6722c5
SHA512 d4e97f554d57048b488bf6515c35fddadeb9d101133ee27a449381ebe75ac3556930b05e218473eba5254f3c441436e12f3d0166fb1b1e3cd7b0946d5efab312

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 cfb04fb6e6f578655b08a6d50054e4a5
SHA1 e9336808b24ebe24eff535f2a158ff65a693441d
SHA256 fb09d45296d3175e7cfcf5b0c284fe3bb3bfd5dea6e90c5c52c4f4c3aa1b0dc7
SHA512 1b9d752494f82075dc959b121dd0641418b5902a597c4427d792ffaea32f254cd7b5ee04f53cfaf20c36b5f0904242d6c0f2b67273ebac465aaa745d8daa470d

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-interlocked-l1-1-0.dll

MD5 a68eddda85e1c77ee3c316d05e215db0
SHA1 eef3809b52bdf0a8a42aa60040d1d0ec34b1c2aa
SHA256 d8e6d80a4fa4d0c3da6c179c551ce65f9e872db5625ae58b8bd69802c09c5d7b
SHA512 24c27a2894ac3ce764f0cb3225e80bf5f7637d3446b25a636917b4332814b9e7af9bdc8706ec6f8088529214367310a61df4bc2df4738ac06fec1f4e4a04e5d8

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-heap-l1-1-0.dll

MD5 8d01d04941918b5d5ddaa4a9d4b1a8c6
SHA1 27b1c293b58cd6af9a951127612857018da482a6
SHA256 2c93dddf2fc65c99565d104a1078d663ebe590ecb74a47bc2ecf1b2e658574ac
SHA512 1d902a947c79e9d7157a32ca0a8ac6da25ee7726ac996f17e060ec6fdf5aee6d717e9e6ea3b0f4539dc3aea632e484082303537e17248a26f7ff1b1db9e4e796

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-handle-l1-1-0.dll

MD5 3486de24e09bc08b324c1c3e9e03b35c
SHA1 85743f027ace6e7da355c420ab162ad4a88c20b1
SHA256 1e7a0823130ca36e2f061ed8c40554ceb5faa906e10b6c042628e8ee6c776b4a
SHA512 053ed4bc2867fbed924b8ff47fba2cf4c302c9f95fedad8dca450b26509c0f6bfdc33e0d19b1afa3cd09e8c218228d0e3475df0200180acbbe97ee6a72482d2f

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-file-l2-1-0.dll

MD5 b5832f1e3a18d94cd855c3d8c632b30d
SHA1 6315b40487078bbafb478786c42c3946647e8ef3
SHA256 9f096475d4ba1533f564dd4a1db5dfeb620248fe14518042094b922539dc13e3
SHA512 f3016ded97591e25a6d4c70d89251a331402455ab589604e55c486fec37ee8e96bd1be2d4e4e59ba102dad696b3e1f754b699f9ebe8ae462e8b958ed2d431a5b

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-file-l1-2-0.dll

MD5 ac28edb5ad8eaa70ecbc64baf3e70bd4
SHA1 1a594e6cdc25a6e6be7904093f47f582e9c1fe4d
SHA256 fbd5e958f6efb4d78fd61ee9ee4b4d1b6f43c1210301668f654a880c65a1be86
SHA512 a25b812b9fa965af5f7de5552e2c2f4788a076af003ac0d94c3b2bc42dd9ab7e69af2438ce349b46a3387bf2bfcf27cec270d90ca6a44c9690861331c9e431e1

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-file-l1-1-0.dll

MD5 3370535abeb8dc8ef37c2c5146d048f7
SHA1 b7a4d43b7948e93ded5b9a4a714ea69efd51cb26
SHA256 df372db5e119520d56f73c1733bdf7f6134c7209e375c7ba6a4c80f37565b35b
SHA512 75eb9a907af3b873787165589dd3505bf634c52e0826feb44f88019a6be385e4086d40f27330387497bda8f4917045833cd0859c8114f275f2416acfb8942608

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-fibers-l1-1-0.dll

MD5 2c2939389d78665ec3a34b1cfed44a8d
SHA1 c86a82c007be025baf8d02b15dc1d9277a1c49a5
SHA256 d4f607fbf213e9e036269574a904ab8868bba26fd42e4fb2c60a425f03934bdc
SHA512 698b6a4c036a1d812f82140fed33cb9039c8774aa75b0b63ec8122084b2fc5d24b99876c82b0207d2e8ee79c7ac5ac11029347fb1beec55282e72d528e179163

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 8c717ad4c92fc26b40ec6830fd9289c7
SHA1 c5ed74b59bcdca1e26639c245900444b894aa06d
SHA256 c119a34d7ac08eccb645a85415b4abfa5a8fb05afe20838eb6ffb558f01657fd
SHA512 b734de4228232b423595bf87bf3b26a5297c6829a1ac976064dea30289e6bd646ff15d6daf40b6885480c9a58e80de31b429f2d233f6294b603e91f72e99e130

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-debug-l1-1-0.dll

MD5 6e84207402f5cd66e00abb1689ded080
SHA1 72559bedd082049c79f2b9fa59b7875a0ddd4551
SHA256 301a110ed905f10243437c5bc2a92cdf7c8609c19cb8baff92c99d8645c8d6f0
SHA512 58cc81404b88e133524d7c62b51f1c0ff9cfbf600e01b912e181529f03af74300a5fec98f85a7303e1dc6ce1ddba519b01b296db8a94a234884ca493567bcf0b

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-datetime-l1-1-0.dll

MD5 5e43b4314980eb7f19506613d4523e63
SHA1 fc2788632181476092a5cb4aa63ef57e4106703a
SHA256 daaacd2fdf366e2c36b42398e850412c8be3093e5b7a8f608684a656d27e4d6e
SHA512 acc730e49b6f59d0e76fdff10d16d89c46ec6a7002af6dfd15407af40813e92e585074bb4bcc71c2b8d7ea44c3e7abaeac7b8a877609de0fdb72324417d7cfea

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-console-l1-1-0.dll

MD5 815bd17033aa15f6937eff710101c784
SHA1 651f373b703cf3e02e77e26119a2a925ded509f0
SHA256 8f0188d00d062f3d650cb811607a64eb7a3b923397da473f38883d942f4f5184
SHA512 b836e6a83a21d32c2c61c98aae05490da2f77b8459c334e3959a02ec31639fb9ac190b53f08e2fa01a953e8c65038ed148f9fd4ea71b6369f7ef466c6ccfac54

C:\Users\Admin\AppData\Local\Temp\_MEI43722\sqlite3.dll

MD5 89c2845bd090082406649f337c0cca62
SHA1 956736454f9c9e1e3d629c87d2c330f0a4443ae9
SHA256 314bba62f4a1628b986afc94c09dc29cdaf08210eae469440fbf46bcdb86d3fd
SHA512 1c467a7a3d325f0febb0c6a7f8f7ce49e4f9e3c4514e613352ef7705a338be5e448c351a47da2fb80bf5fc3d37dbd69e31c935e7ff58ead06b2155a893728a82

C:\Users\Admin\AppData\Local\Temp\_MEI43722\select.pyd

MD5 e4ab524f78a4cf31099b43b35d2faec3
SHA1 a9702669ef49b3a043ca5550383826d075167291
SHA256 bae0974390945520eb99ab32486c6a964691f8f4a028ac408d98fa8fb0db7d90
SHA512 5fccfb3523c87ad5ab2cde4b9c104649c613388bc35b6561517ae573d3324f9191dd53c0f118b9808ba2907440cbc92aecfc77d0512ef81534e970118294cdee

C:\Users\Admin\AppData\Local\Temp\_MEI43722\pyexpat.pyd

MD5 79561bc9f70383f8ae073802a321adfb
SHA1 5f378f47888e5092598c20c56827419d9f480fa7
SHA256 c7c7564f7f874fb660a46384980a2cf28bc3e245ca83628a197ccf861eab5560
SHA512 476c839f544b730c5b133e2ae08112144cac07b6dfb8332535058f5cbf54ce7ed4a72efb38e6d56007ae755694b05e81e247d0a10210c993376484a057f2217c

C:\Users\Admin\AppData\Local\Temp\_MEI43722\libssl-3.dll

MD5 19a2aba25456181d5fb572d88ac0e73e
SHA1 656ca8cdfc9c3a6379536e2027e93408851483db
SHA256 2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512 df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

C:\Users\Admin\AppData\Local\Temp\_MEI43722\libcrypto-3.dll

MD5 e547cf6d296a88f5b1c352c116df7c0c
SHA1 cafa14e0367f7c13ad140fd556f10f320a039783
SHA256 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA512 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-utility-l1-1-0.dll

MD5 0f9c1208db419b09d30c4f7cb13805be
SHA1 bd54564d3d679480ad4be7e68ed9e3b228e167b9
SHA256 a614bcb61d620cec8a2f919037f55531f8648f6a2e4b711fa6635213593cf441
SHA512 4084cec138f3afd583ad565523937c018667e6cafc4ac47867b3e9b4f3ed6d22c8df6f465a984b182cc4b9ee779ee3f83d5d9e54090e1d14400d934e70654290

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-time-l1-1-0.dll

MD5 97b8fb791946d8937c3c44fd656080e4
SHA1 c21a787f736455cf5917b490b79818c927937da2
SHA256 e75df3e5edcee75d24323182c45cd4fbe76437e60f7fa33f15b8d7ad4698116e
SHA512 399c3744f604096eaeda1753ea1efd6fcc664768e2f09b42593860d5b34ce863e44b726db414a8c16fc94bd1ec177ed60a0ede72db405314a7ba1b3d02247855

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-string-l1-1-0.dll

MD5 a61502fa78ff8d7a24d9361129ae07c3
SHA1 5512da3cf6590e1537da51c3b72aea66476cdd07
SHA256 7c70b4c871b0a5ad05c7003f3a8359f8644cb208551db472ed09a59629080b2e
SHA512 ac0a4ed9e0239e3dcfb406b96acef3a2ec2fd3eb222be6f0a178c5a89fe22b55b7c22fc5cc06d5ed9e28b6c8b580a674fcc59a8987cc3c600e5b7ead19650c44

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-stdio-l1-1-0.dll

MD5 3031d77d1b8d238b41d3e196a5bf8671
SHA1 aaae7b68895b3abba3f8415bfb4506ea39c952cf
SHA256 fd81e42596789765052bae850bee4d17d711d0241ebe05f83c1f022f397e5dcf
SHA512 f9b61572b3d04d7aa5fd703f0e39df3784de1fe5926cf2c0f6a158be8eb0c330b950871a2ec20e3cea9919e958fcbc93465aebd98fbcd35eb5f790f0a5f290fa

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-runtime-l1-1-0.dll

MD5 ced121dc1b464f420444a1d0ba79eca0
SHA1 c1336130fc9cab6eaee49980853467cbb9ed867f
SHA256 f3fb05146adad6ab5501980557116baeecd3486fd34bbd737761891093ed94f8
SHA512 3d238c586ca1ddb2dbe6dbdffed6b6b3eed103d04f2015d37f000372cc0f17f944db4d71cb7228e498c1463a0cea97de071cb5a7c8e66a52a8e5a548d23b8daf

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-process-l1-1-0.dll

MD5 7114446ebc88ecb377c6001b3af10ed6
SHA1 7c25a4979146acb427ea3a8c5a708e1068c62124
SHA256 d8fa75707faa36c6096700f919ff838e81de6070b7a7e9225ae3755e5d728f2e
SHA512 3ae5bffdd1cfc400d399c99960552f3e31c10fd0f2c0a010231990bb844f5eb114a720ae3c5d24a5f670f2bfcebfbc7bd0431caac923ad70fdbbae3b94f3a933

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-private-l1-1-0.dll

MD5 c82aa01e723a26708090264dfb9dcb9e
SHA1 26b5f67e746dbcf8028a2ece6da5509bc02f2e6a
SHA256 91070fe0dd87cbbb555861b04a56a8d696d09d5e1b2cbba6798b8349ae29c24d
SHA512 5c7dfb49620f2e71b318e6989db75b7c76e585d88edf7376ad4f7dac4d90cc6151e51778962fc68f7066102e0ccc04ec4604ba0b170748e9c22ac0d7d43d754c

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-multibyte-l1-1-0.dll

MD5 192cb070cf1e99b7f41c7fda52169634
SHA1 9465d9cd8ca75a340811d7ecd0c96a9c4ce9f2ba
SHA256 ad783ec1e283097ae19c1acc6a4f9a98cb1c3c362c953718aec815984fe65494
SHA512 ce062c2ff620e321d86444038f671ac57075acbd511cbbc6b06e10766c2f13114bfbaaad216ef520a43d56234c41037de139443cf09822c5cc156ed2726862e3

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-math-l1-1-0.dll

MD5 d0c2ee5f3fb39ec424ebda1f64b762f6
SHA1 5fabe4443de811e7fce11d467e5c1ff720ae8f56
SHA256 5ab428c62ab90056eb4d8e2fdf816851e78f69ee7fcfd198672c7948153be529
SHA512 745a0e24ef74011d8ad5df5853bea8c2826ca081c2a3cee1ba74561238436dccc0ec4051ac09575d3645d4a18439e777a1a9b1e4aaa6603f92fdbf1b9d17a024

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-locale-l1-1-0.dll

MD5 ba60c991c516d853f41b7fb481a39eab
SHA1 7578bebde38fbd4c5288003ce853a58d86fa4925
SHA256 91e314de4017473445b51c0ced5b73c1ecfbed3705cf1d00eaa943962531dbca
SHA512 0addee8938fa3bd3f65711c5a504ee1383f3db8d23764ff73c56205e976e243aa1a354fba4078196f4b2ff13a760aa1f893daaa70a5e3979fe0c3dcf771cc9d1

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-heap-l1-1-0.dll

MD5 02a69ea376f962127a049c6acbc53354
SHA1 1044f4d1368182a77a086a2aad7c91c822648537
SHA256 6dc3a055feacc23fa519f79c6b7b7184ec0fe498adfc05f02c0afb9afe34bd93
SHA512 fd4c809540c59a7031848a6ea3f14f10133f6d57770c8eee0012da7e3cc0b0f646ae4238cb9c0836bd6837130d7b11b0e3a64711e1f919caed4145ca0fe6f38f

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 b4f47d3687c6b9020670eb3d599f23e8
SHA1 163752317c8016d21c4cf544fec133831b9665a5
SHA256 a923525c86d4345a5324a76e5a5f6e8e2c634e3b012c8cb78e87945bf966deea
SHA512 d15815dd2ce4c9d9bf38ff0e930a54473dcfc8158ecb45cd29c700f62a1aac6b7e8126defa856b6541a1dcaa4c1f2fba4a92baa9efa89d8463c520f19928adf8

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-environment-l1-1-0.dll

MD5 33fc9f137f8fc2bc99e5d085388f3e58
SHA1 564287f41e5fa576c26baad8fcf285a3a5edf7cd
SHA256 527100daa26b386c064c2e99e84f2b99d87aecb66823475687727cf9df809221
SHA512 a601f2d7f4d4c2eb9a0f32824880220e5fe33ee2abdcfe4c11793a8fb4ab2374f43c3787a0bffcb79d6bb7941b182e7cdc47a319bdbc695cd0c260ba94ec3806

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-convert-l1-1-0.dll

MD5 661fe6801836492501a1b1ede1e90cab
SHA1 85782d99b4473b746a1d1449c23edec7d06ec310
SHA256 d01129b17ef28f4e674cfa4dcda0f82078bbbc140cad9a8ab31b384fc105628f
SHA512 61d4c9c6acaea6c38c86d2d0683f1eee9156a64c280dfac92127fcbd9e135d40779c205ca8473fb53f8a2f4f91f75d38d11556571dc2c48c8fb71c168bc4454a

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-crt-conio-l1-1-0.dll

MD5 0fba25ed6b6f8b676d2d6ad02554103c
SHA1 da6e0106eb4cce4fa2d17eb12da90bef5685fd5f
SHA256 43a91c96153ceb11a56dbaf3d9eb6464cba904da6952bd10649d2503fc6d484e
SHA512 6d8e3059ff42a44392fdae0fe6218cf77184493fd889ef7ad9aeeb05b67df6da084fb5c61776afc17d347bc6e1cdab35990bb5ebed4da0cb625050a93bd1f708

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-util-l1-1-0.dll

MD5 26484ca59ac50eef4a5b9886173cb389
SHA1 111e11b27c2df193d8aa3707aae45a9b78930e04
SHA256 56dbccf349622daee692a2a6feb846f7018d4d049ea4e972d5cd61a34e3b87b3
SHA512 4d1c7e179aea6bd8e258cc6720bdd8fb45f7ad0814dbd61b960f46d379146de35d8e28217b70d577de4189f778b89907f8075e2e480a2bc6530b00696dc479db

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-timezone-l1-1-0.dll

MD5 863ed806b4f16be984b4f1e279a1f99b
SHA1 b9a919216ef90064ac66b12ccde6b3bf1f334ee8
SHA256 171ca9df2b9ecfa545748af724c1c56ab396b299503a14c4da2197b0e5a44401
SHA512 fb8f195d9a1885c16aa2cc6eff38e627ea127b18978016d6046dc0120a19ab40cc4fe4b799c06f133b02f7cd6a634ae1665f05f9be5fcae609229dfaae0ce478

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 10b937bfe0a4b9759af343dbb9070596
SHA1 d9305a0015dbb8bdd28cf5898d943b4e2ed2f9f6
SHA256 4d499a6cb6f5bc31ac5d1ad25dd3283f888907c17aa6846da16d3761777986a6
SHA512 f5b0bf4418a64bec22316d16dc5f535caba9e4ede6790b555115af9089db647e7c36fbfeadb23d0aa9222059dadb4235bbec6029e99625d66d6e3a7da1aa6276

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-synch-l1-2-0.dll

MD5 5a9f2ce42bb237a8d25d2b8d3e905bd4
SHA1 f2eb1be1b6bbf48f09e3220cbcac85ce4c1a371c
SHA256 ef94c2a19bd9a30a7e099572402737c1b6bfcb60f3074d3dcda85de0ce6fb674
SHA512 2f986a8629f9b59e9d9a380aa65d42f2c9241c02a4050721add0cca3a4e16ea8b0b1ce1f81fa1c521c2f7810b9aa4642f37f5173d6ca53fc176ab3e91b5c5c29

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-synch-l1-1-0.dll

MD5 b84fb9322caa36fdf409f18e8304a5bf
SHA1 876721afbef99f771fe6db783f950602b8e9abea
SHA256 28e499c8ff5146fadb3799f88ba2cabc42d3a3fed0d2de43e6d194eb0a5e93a6
SHA512 4b65930cc152b9fd7acc5a3156487a2bf3a5d2d6731fa48189c47f65784797d224094fe56f8bd48a02aef3d1207d81ac09d747c251c6de2a93efb9afd7cfafb9

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-string-l1-1-0.dll

MD5 a7e6fd9da0b366256e39dc7a227af909
SHA1 068e54604e0cd8cc9e0149f9cf139cd8d6b6665f
SHA256 b1a9c3e26fc2dd6d701d624969a29a16e04681c057999b4773d9fd4f4d3bbbe7
SHA512 cdc7ed374cc4f109d84270981888ff9eafc21325ff85db9439a103f4a4d49e8f64d53f8b5d7ca2f983dd607fe765d80b3dfe321c2d22216924dbd3c8aa468720

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 3493376565524418af30afc7a97b0561
SHA1 abcfdcad703e05cbae97d004119b966920e04a5f
SHA256 8ed0ffbd5462ed7fa2a82efaa5f5de4cb3849699b6cf1be93ce5fe746ef7c58e
SHA512 01254e63ad3ae9194f74a6a992f8e236afc934b04e8568fcab4b6460f179d40641b1483c0a12463f004bd0b16909bcc2381a8996c96e151cae4ce2f287f00eaa

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-profile-l1-1-0.dll

MD5 59a815641390eeff6badaee84e8de7d0
SHA1 ca63e4696de7f5e913f942f1fd0b807959a8c972
SHA256 97f18741abb1d6d215503234b603755dec3d0e8d4c5f08060dababe7660a420d
SHA512 b91cedabc790aed85b9a1eed4241add1f73b1f890c1bb48efec750be7b59d44ca03d62cf1a011f23cdbf66bf80ef26ac01b7d8ef9e7ead3fa45306620aa1a056

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-processthreads-l1-1-1.dll

MD5 8ff0692d32f2fcb0b417220b98f30364
SHA1 5eeb1d781d44e4885284c8b535f051efca64aef8
SHA256 53cea73c248a49389bc2da01acac1d8e8022a7e034bcd522306e43a937200897
SHA512 f73249f70953c537da02b890308cb18a9c6676401975bf13aeb61b1db9dfa042e908c52ee266b404948a568b23b0cfb37ecd4b80379c398c15f56ce7a82cf7a5

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-processthreads-l1-1-0.dll

MD5 f3d59040c56520a117d3e7f0d4df50b0
SHA1 cde5fbc4cc283338bbc98b4c87ec21874369d98f
SHA256 6c2268cfc9b365e9683ed1f7b704d4fdc60938be8fcd2074ec3e1c35112b5785
SHA512 aba461363630ac9a429af794c9c43ad2ce23bafebb4902b5d40d370205fbe91dbf22a97aa4d355202d2d3c74721d3e6d547d84ac740ea24a1bdcbb8ee6a2c5b8

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 83dd9755271b3e32e9ccc44602b170c5
SHA1 a7c3cd5b6c0cce5d85e666cb181d6a0247521cb6
SHA256 9b6f3d134547f882f476173a857a865dd9373c9befcfac0c324f1be673a2c9b2
SHA512 f41e644feebe5b41320f0272b2106e62d9f835f710e4035bbe15bcc997dfc6d503a5a946ba1f2437e3c149c095f7fade7a7929393a1821290a27c6859c70150c

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 ff505a3c725c068f0177d27e3def4707
SHA1 72e5942aaebf0e942d71d7f2231fcc2243ac165d
SHA256 5b93dc92eee5dcc91aaa2a479cfd989c41a8ffaeb29e92959a730e7a632dce1b
SHA512 072d6e1d843af90e19d356773317df491a06b952673ed34c7731242796ad647716e2c7544a4ca0ee37a1c7e738462973201d57f20fc57705db8b8e8061badd26

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-memory-l1-1-0.dll

MD5 671bc514f0373f5775448215da9ecc19
SHA1 8a1ce5f0c482ff9b7adc9da0c4e7c5876df3dc57
SHA256 effb3bc6746e41e4139779aface86afc4e14454b95fc4a999dfdd07b03122a0f
SHA512 dad926d9046a73f46be7d52bc5df61ea7178f42ff18fcf57064d78d0f94bca4e7641cc467606891f69985b860e80ec028475ecefd17f3765763b51df256822fc

C:\Users\Admin\AppData\Local\Temp\_MEI43722\api-ms-win-core-localization-l1-2-0.dll

MD5 fd59ee6be2136782225dcd86f8177239
SHA1 494d20e04f69676c150944e24e4fa714a3f781ca
SHA256 1fd044fdbc424779b01b79d477ee79dfbb508a04e86c62e1c8fc4f6d22f6a16a
SHA512 2250d54c3b9e6aeb2f5406e1428536564357a48ceab51596b33ff0843086fb420ad886af61725b25a58e2f50a4c17ddee10696d6041db9b60891eff8e495775c

memory/4048-1198-0x00007FFC297B3000-0x00007FFC297B5000-memory.dmp

memory/4048-1200-0x0000028860110000-0x0000028860132000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cv3dktir.fpy.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4048-1209-0x00007FFC297B0000-0x00007FFC2A271000-memory.dmp

memory/4048-1210-0x00007FFC297B0000-0x00007FFC2A271000-memory.dmp

memory/4048-1213-0x00007FFC297B0000-0x00007FFC2A271000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win7-20240704-en

Max time kernel

121s

Max time network

123s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 406c8805a77b719f23a270d13b604bef
SHA1 c930391afd385984b5c2f6b86eb1806ca84b52cf
SHA256 0dbe09156a7e147fafa5a244580b013c192dae5133b2e2314968bec59ead8a9f
SHA512 0fe434116d62d920e79aa80e21a3f0afc34ed52db4252c7c2249e303bfb90b60b9dd1dc73b5c7ae3b123dd33feefaf9f756bd4219dc4b5654fd1b8652ab79e97

Analysis: behavioral5

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win7-20240705-en

Max time kernel

121s

Max time network

123s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 737af513692dc15c16ae0c4167d9d6dc
SHA1 bf3c66ca5bc78bf925d7ba8a6d3a941da9c08c1e
SHA256 917d5eaa549fca98f61226044dce51d59c8f21894e628d60e268a0008a2b4d36
SHA512 6f22c79a0076feceefdd7bfd2eea66bd4b5b024701c443961f40ed5216f2eb15bdba8229704eacfa41187c1ecc848857261a3f575c732154f5802d9c7379c68a

Analysis: behavioral7

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win7-20240704-en

Max time kernel

121s

Max time network

127s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\misc.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 d2a5995a3eb4cc1e96c454f38ecf74cf
SHA1 75c0f7043f3d1beace171df18bbdd7efb7ebb4df
SHA256 377aace1a7bc864f80ca1dcb2db663b839c6dbfcacc03cbbaa1ec56aae1413f7
SHA512 13776bb2efbb57efd31c7da84fcff21a3c3c3775b4f15b696de41fbc7d85f5ab079fc25061e90436a34565f9cdc49dd791b964c4689b50591c07ae6aa68731a1

Analysis: behavioral12

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win10v2004-20240709-en

Max time kernel

93s

Max time network

97s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 147.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win10v2004-20240709-en

Max time kernel

136s

Max time network

145s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp

Files

N/A

Analysis: behavioral6

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win10v2004-20240709-en

Max time kernel

148s

Max time network

150s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 55.36.223.20.in-addr.arpa udp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

N/A

Analysis: behavioral9

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win7-20240704-en

Max time kernel

121s

Max time network

123s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

Signatures

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\ C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc C:\Windows\system32\rundll32.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc\ = "pyc_auto_file" C:\Windows\system32\rundll32.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc"

Network

N/A

Files

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 0ace129defd4d5b5ab2bee4457fd08ad
SHA1 8a200d3d2276b66cb39ab4bc3ed9010975909218
SHA256 cf111f76424c0fa1b58213f1e76e96ec89bbb0c809237c3a1c8b53bd6de69c7a
SHA512 4d79444eec6b1a1d7c3c5b43d6aaa8e804e1aaecce58d66577a27de6a9158450bb4127d6f201a96d9da7f16ec72a49535c6d88dc1900e211fbd44c86b37ad252

Analysis: behavioral10

Detonation Overview

Submitted

2024-07-30 01:18

Reported

2024-07-30 01:22

Platform

win10v2004-20240709-en

Max time kernel

136s

Max time network

134s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 71.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

N/A