Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    16-08-2024 23:14

General

  • Target

    discord_token_grabber.pyc

  • Size

    17KB

  • MD5

    6d95a89c15e75f18ef85408e3405ba6e

  • SHA1

    0d987185eadf9c6000bff8678d4cba24b897f7ed

  • SHA256

    e95f674ec4cf7be0e53828c712103d8d136a13aec5a4f06fa8bd88d42a2176bd

  • SHA512

    bbcf9790dabbd108f0a4161e1c01142d42cd81527411a0fc78087cd8ea07399586fb7ef93a7108654a0ac763e9e88015f2f0ec0028f76c3ad2d13f3864f568ac

  • SSDEEP

    384:cGllyAavQS9F0RW807PPQviowoYbCj+Mo8WWIc02a8:cIlytv39iRW8inQ6owoYOyM0d2a8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2888
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    60cd7b3db40441a95e50607b4e62c7f6

    SHA1

    aedb956c21f444a4c92d5f29c4aeca08f5c3d8da

    SHA256

    5ea1cc96be24261ee59b5dc9c4f876a8891398b155113082a4af451a7aa7a5ea

    SHA512

    8ddeac20e026b435958d1705ea9d0bd6f4bad1e148d5c6f4f0c9a38385647a6d17423ccb4ddd4e95b569054b373d8936ae93c8f3d29493b1f0670bfb3fa981ab