Analysis
-
max time kernel
193s -
max time network
156s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-08-2024 22:53
Behavioral task
behavioral1
Sample
loader.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win11-20240802-en
General
-
Target
passwords_grabber.pyc
-
Size
8KB
-
MD5
704dced7f7530b19a34a5f7a71c26b10
-
SHA1
608d9647488cfa2b5f84a891028168a973bfcfa9
-
SHA256
1fd284f1e27263bd2a16050c6989933a382c7d196f4c9f247187cc3b3f6ba3ac
-
SHA512
e4a6710abef2c45d631745c91d8135873be06e5b240a61362e341d05ecc1dedf885487a554b648c328a3c5cc17fcf74e6d066b2e3f51379358ba28c2a0f2f39f
-
SSDEEP
192:+CE34EAL/GFf/PomdPO23NsDmqFUhkxNivLI9dRvL:Y4EAL/AfRBO8NsxuOxNn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\pyc_auto_file\shell\Read\command OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\.pyc OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\pyc_auto_file OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\.pyc\ = "pyc_auto_file" OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\pyc_auto_file\shell\Read OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\pyc_auto_file\shell OpenWith.exe Set value (str) \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.exe\" \"%1\"" OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5148 OpenWith.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5148 OpenWith.exe 5944 AcroRd32.exe 5944 AcroRd32.exe 5944 AcroRd32.exe 5944 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5148 wrote to memory of 5944 5148 OpenWith.exe 94 PID 5148 wrote to memory of 5944 5148 OpenWith.exe 94 PID 5148 wrote to memory of 5944 5148 OpenWith.exe 94 PID 5944 wrote to memory of 3692 5944 AcroRd32.exe 98 PID 5944 wrote to memory of 3692 5944 AcroRd32.exe 98 PID 5944 wrote to memory of 3692 5944 AcroRd32.exe 98 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2028 3692 RdrCEF.exe 99 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100 PID 3692 wrote to memory of 2368 3692 RdrCEF.exe 100
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc1⤵
- Modifies registry class
PID:2984
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5148 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5944 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2869EA611271467A67A5AD939A66DC91 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=8583C9250408074DAA0620AEDFDD5DFB --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=8583C9250408074DAA0620AEDFDD5DFB --renderer-client-id=2 --mojo-platform-channel-handle=1784 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=234FC154FAEBC9F8380A010C4C9AD35F --mojo-platform-channel-handle=2308 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:656
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=774E212C7F0812D39306800B887F9F6F --mojo-platform-channel-handle=1940 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9ECCBEC98DB87E3FFF25269F003B766C --mojo-platform-channel-handle=2536 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372