Overview
overview
10Static
static
10source_prepared.exe
windows7-x64
7source_prepared.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
428s -
max time network
429s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 09:02
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240730-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20240730-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20240730-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20240730-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240730-en
General
-
Target
source_prepared.pyc
-
Size
168KB
-
MD5
302984737b755a0c0647529e4e06a5d6
-
SHA1
903e63cc9b56085f3cfb9765c74ee591ae845cda
-
SHA256
3353718942012ab87f9cb1a700a744599e968993c7673ed7948667ebd5c407c5
-
SHA512
3169fdb3a26a4df9ff308d8692accb709d50be28f6ea92f9ec1ebf7bbede0baa897be91cae65de20074b4c72798e40c7952fd30a38d331efa24035a566993f05
-
SSDEEP
3072:sbf5aOO2UaSMS46o4PZTJ0pZXScT0wfxIvdXzusTWP:sr5aOO2UaSc6ojpUY0wfdsS
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3089151618-2647890268-2710988337-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3089151618-2647890268-2710988337-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 4484 OpenWith.exe