Overview
overview
10Static
static
10Credit+Miner (1).rar
windows7-x64
3v2/Main.py
windows7-x64
3v2/Proxy.txt
windows7-x64
1v2/Run.exe
windows7-x64
7discord_to...er.pyc
windows7-x64
3get_cookies.pyc
windows7-x64
3misc.pyc
windows7-x64
3passwords_grabber.pyc
windows7-x64
3source_prepared.pyc
windows7-x64
3v2/Settings.json
windows7-x64
3v2/recaptc...ass.py
windows7-x64
3v2/tokens.txt
windows7-x64
1Resubmissions
22/08/2024, 19:09
240822-xtvrnashnb 10Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:09
Behavioral task
behavioral1
Sample
Credit+Miner (1).rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
v2/Main.py
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
v2/Proxy.txt
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
v2/Run.exe
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
source_prepared.pyc
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
v2/Settings.json
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
v2/recaptcha_bypass.py
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
v2/tokens.txt
Resource
win7-20240708-en
General
-
Target
Credit+Miner (1).rar
-
Size
70.2MB
-
MD5
a3f7db2c74bf92b5e64ff008003830c6
-
SHA1
d9cac62f635c63d752e34488606c23bfbe589570
-
SHA256
a7482e665aa974507d5c7605acc2da8d260465d765416472ebe798f73f99184e
-
SHA512
bf0128a5d9725165f4ed2b7cbf11da65e61de51b5f28fd0b32a1c0cfd07d92c2b0b9c9d1db0caf45cf9732f4caa9d463210902454f54adfdfee086c52f836410
-
SSDEEP
1572864:OuE5fW7tkouXWj77t+QOclAtbnuqLMrsaqyvCwrAtpNbhD:Ov53qb9etqeQUZ5D
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2257386474-3982792636-3902186748-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2580 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2580 vlc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2004 AUDIODG.EXE Token: 33 2004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2004 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe -
Suspicious use of SendNotifyMessage 9 IoCs
pid Process 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe 2580 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2580 vlc.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2860 2140 cmd.exe 31 PID 2140 wrote to memory of 2860 2140 cmd.exe 31 PID 2140 wrote to memory of 2860 2140 cmd.exe 31 PID 2860 wrote to memory of 2536 2860 rundll32.exe 32 PID 2860 wrote to memory of 2536 2860 rundll32.exe 32 PID 2860 wrote to memory of 2536 2860 rundll32.exe 32 PID 2536 wrote to memory of 2580 2536 rundll32.exe 34 PID 2536 wrote to memory of 2580 2536 rundll32.exe 34 PID 2536 wrote to memory of 2580 2536 rundll32.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Credit+Miner (1).rar"1⤵
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Credit+Miner (1).rar2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Credit+Miner (1).rar3⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\Credit+Miner (1).rar"4⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1860
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004