Overview
overview
10Static
static
10FallenAndRustGen.rar
windows7-x64
3FallenAndRustGen.rar
windows10-2004-x64
3FallenAndR...en.exe
windows7-x64
7FallenAndR...en.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-08-2024 14:56
Behavioral task
behavioral1
Sample
FallenAndRustGen.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FallenAndRustGen.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
FallenAndRustGen/Fallengen.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
FallenAndRustGen/Fallengen.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
source_prepared.pyc
-
Size
172KB
-
MD5
5d9991f7cb588a79340437de537941d0
-
SHA1
60903e2828a0365cdac6ae067cc2dc5f5b212500
-
SHA256
4c3691e2c03934be70659bea57ff9b045f666fa0a9666dcc57a90b2c4d471429
-
SHA512
8f29646d3a04ee130f7ba8965a404225345fe4693716c9167d5ed562314e34bf99fc691a504d4607abf987024818c363be7b86127a58a107d87836a71134cccd
-
SSDEEP
3072:+r8yD0aOO2IC1VSTro4PZTw0I1ScQaQV+COOIvdXze0sTWn:+rfD0aOO2ICarooIoRECOsM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3012 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3012 AcroRd32.exe 3012 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2664 1988 cmd.exe 32 PID 1988 wrote to memory of 2664 1988 cmd.exe 32 PID 1988 wrote to memory of 2664 1988 cmd.exe 32 PID 2664 wrote to memory of 3012 2664 rundll32.exe 33 PID 2664 wrote to memory of 3012 2664 rundll32.exe 33 PID 2664 wrote to memory of 3012 2664 rundll32.exe 33 PID 2664 wrote to memory of 3012 2664 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD528b16e329d17f3cc3659e9c8b49b46e1
SHA1fd96a03091a95de70366ab92284ec1985b486f5b
SHA256f703d47d2b7888c839c60a5831a899311e52d14d2b8a15ebbb5f0b173e6fe9c9
SHA5121438d4a8634f3748c45ce572a4e8f13643326da6d5c821384366b099ee565686ada9fe74369ad79edceed81c0fbdb39b74728ed4d422f7b495b49fe2dfe03062