Overview
overview
10Static
static
10discrord w...72.ico
windows7-x64
1discrord w...72.ico
windows10-2004-x64
3discrord war/icon.exe
windows7-x64
7discrord war/icon.exe
windows10-2004-x64
9main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
discrord w...py.lnk
windows7-x64
7discrord w...py.lnk
windows10-2004-x64
9Analysis
-
max time kernel
1556s -
max time network
1557s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 03:17
Behavioral task
behavioral1
Sample
discrord war/IMG_7172.ico
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
discrord war/IMG_7172.ico
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
discrord war/icon.exe
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
discrord war/icon.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
main.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
discrord war/war.py.lnk
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
discrord war/war.py.lnk
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
7KB
-
MD5
9e124a6114567444762a274a0ec6dcf3
-
SHA1
ee2422931197aca302b7a93bca0eca081e733f80
-
SHA256
62200eba33f99cf10356670b1ef8000ac27aecbf53619940b51bfa73671561ef
-
SHA512
db9a2c3a97e598bcf6b5a6606f559606c9d68524b8f402c2ec80b835aa32d8015eee3dbaad9c7ef2918e34fb90fbf3f1d1ecee7af978a59c249ecf02966af010
-
SSDEEP
192:wrXolqMYD86kGWdXwXybi3mnOJhwxx3gcHX4MdwcW+unnw:UWAzWuH2S2f534PcWlw
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\.pyc rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2744 AcroRd32.exe 2744 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2712 2392 cmd.exe 31 PID 2392 wrote to memory of 2712 2392 cmd.exe 31 PID 2392 wrote to memory of 2712 2392 cmd.exe 31 PID 2712 wrote to memory of 2744 2712 rundll32.exe 32 PID 2712 wrote to memory of 2744 2712 rundll32.exe 32 PID 2712 wrote to memory of 2744 2712 rundll32.exe 32 PID 2712 wrote to memory of 2744 2712 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\main.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\main.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\main.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d621de48e5bfeb3f18cfa76d3f901220
SHA12f016d63dcd4667662f91d8795a9f1d228b474ac
SHA256202f41fae9bb809eaff2f7c36168cdc570c14484a2f5f6806228b9bf3fd00e25
SHA512b8de731d411672e2e9e7441f38e35ffd10deb0d2e1e3f9bc9a5d16ebf4ad23ee9456d6b8b2fe0cde90337e6d92985ce9a29ed74faea46fd3a37b37da7e82796f