Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09/08/2024, 19:49

General

  • Target

    discord-multitool-main/func/massdm.py

  • Size

    755B

  • MD5

    95f304421109131611b3dfe97fa6f044

  • SHA1

    88dc672a5095155fe5400a6325fe94bc5dcc8c76

  • SHA256

    3ce136ee2c6588fe4822725455c009972733c9bee3ead1c636cc0e46295a1f2b

  • SHA512

    1b1e42db4567727674767aef79942542c0e224105b0d2ba635cfeba9d55286176e9be71ef192a971899de97337f8fea9e62cf9c951135a357a811f8e7ca980e8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\discord-multitool-main\func\massdm.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord-multitool-main\func\massdm.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord-multitool-main\func\massdm.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2564

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          5ed6f4c0c1c990e9ed91db46e7c5d4de

          SHA1

          cdded3f6a1b94dc229225a895e5aad8d3b87e2dd

          SHA256

          181310af6497477dda150f2d875d290818e5fdfb078a9257d7ce58e880b5198d

          SHA512

          1506721c39cab4cb4ac358016ce3f1bfe2b593fe2705d2e93324f6a894077bd2886c223cfb81c5237adb9ef6f77b9ecd3404d8bbc8de113ae2b6832fa734720b