Overview
overview
10Static
static
1Twitter-Ac...ons.py
windows7-x64
3Twitter-Ac...ons.py
windows10-2004-x64
3Twitter-Ac...t__.py
windows7-x64
3Twitter-Ac...t__.py
windows10-2004-x64
3Twitter-Ac...cha.py
windows7-x64
3Twitter-Ac...cha.py
windows10-2004-x64
3Twitter-Ac...nts.py
windows7-x64
3Twitter-Ac...nts.py
windows10-2004-x64
3Twitter-Ac...ail.py
windows7-x64
3Twitter-Ac...ail.py
windows10-2004-x64
3Twitter-Ac...ons.py
windows7-x64
3Twitter-Ac...ons.py
windows10-2004-x64
3Twitter-Ac...uth.py
windows7-x64
3Twitter-Ac...uth.py
windows10-2004-x64
3Twitter-Ac...ter.py
windows7-x64
3Twitter-Ac...ter.py
windows10-2004-x64
3Twitter-Ac...ils.py
windows7-x64
3Twitter-Ac...ils.py
windows10-2004-x64
3Twitter-Ac...ain.py
windows7-x64
3Twitter-Ac...ain.py
windows10-2004-x64
3Twitter-Ac...rt.bat
windows7-x64
10Twitter-Ac...rt.bat
windows10-2004-x64
10Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-08-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
Twitter-Account-Generator-main/exceptions.py
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Twitter-Account-Generator-main/exceptions.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Twitter-Account-Generator-main/helpers/__init__.py
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Twitter-Account-Generator-main/helpers/__init__.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Twitter-Account-Generator-main/helpers/captcha.py
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Twitter-Account-Generator-main/helpers/captcha.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Twitter-Account-Generator-main/helpers/constants.py
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Twitter-Account-Generator-main/helpers/constants.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Twitter-Account-Generator-main/helpers/email.py
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Twitter-Account-Generator-main/helpers/email.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Twitter-Account-Generator-main/helpers/exceptions.py
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Twitter-Account-Generator-main/helpers/exceptions.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Twitter-Account-Generator-main/helpers/oauth.py
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
Twitter-Account-Generator-main/helpers/oauth.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Twitter-Account-Generator-main/helpers/twitter.py
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Twitter-Account-Generator-main/helpers/twitter.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Twitter-Account-Generator-main/helpers/utils.py
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Twitter-Account-Generator-main/helpers/utils.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Twitter-Account-Generator-main/main.py
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
Twitter-Account-Generator-main/main.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Twitter-Account-Generator-main/start.bat
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Twitter-Account-Generator-main/start.bat
Resource
win10v2004-20240802-en
General
-
Target
Twitter-Account-Generator-main/helpers/exceptions.py
-
Size
450B
-
MD5
d3cc0b8eeba12110b3bcbc19c668ea7d
-
SHA1
64c0c40e4f761a899a9dd1f2d93ede93fc25d3a7
-
SHA256
8880f04d4c92605d7c7b9ce1e2dd99eeec681f61d0924cbc99fd664c8e3cfe34
-
SHA512
e3774557bc1a7813bc12c36d779765858ffd3df08d50bdb617466de4dd62c5b206fd9cd975c9fa21b8f5fae9f74d17077000c94ae5302c09c58b3f1b435e1bb8
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2636 AcroRd32.exe 2636 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 3052 2376 cmd.exe 31 PID 2376 wrote to memory of 3052 2376 cmd.exe 31 PID 2376 wrote to memory of 3052 2376 cmd.exe 31 PID 3052 wrote to memory of 2636 3052 rundll32.exe 32 PID 3052 wrote to memory of 2636 3052 rundll32.exe 32 PID 3052 wrote to memory of 2636 3052 rundll32.exe 32 PID 3052 wrote to memory of 2636 3052 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\exceptions.py1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\exceptions.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Twitter-Account-Generator-main\helpers\exceptions.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58750a18960e758744854538622b7028a
SHA15d1c3785996305ec87a7e80d2ee3c652847a591e
SHA25689c81ff3c0b55a436fb688f2b6a2ac3bb4b2f8e2e1e0de5bb2ad7294de127908
SHA51211a2d3d060ce5207ab341837e348f2d2f483b189bed746937fc977e23aff1bbf62f015d69ec799ae2db6966d4db674924530e9e90294dd4c2d14d04cd9b61ecb