Overview
overview
10Static
static
10Credit+Miner (1).rar
windows7-x64
3v2/Main.py
windows7-x64
3v2/Proxy.txt
windows7-x64
1v2/Run.exe
windows7-x64
7discord_to...er.pyc
windows7-x64
3get_cookies.pyc
windows7-x64
3misc.pyc
windows7-x64
3passwords_grabber.pyc
windows7-x64
3source_prepared.pyc
windows7-x64
3v2/Settings.json
windows7-x64
3v2/recaptc...ass.py
windows7-x64
3v2/tokens.txt
windows7-x64
1Resubmissions
22/08/2024, 19:09
240822-xtvrnashnb 10Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:09
Behavioral task
behavioral1
Sample
Credit+Miner (1).rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
v2/Main.py
Resource
win7-20240705-en
Behavioral task
behavioral3
Sample
v2/Proxy.txt
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
v2/Run.exe
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win7-20240704-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral9
Sample
source_prepared.pyc
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
v2/Settings.json
Resource
win7-20240705-en
Behavioral task
behavioral11
Sample
v2/recaptcha_bypass.py
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
v2/tokens.txt
Resource
win7-20240708-en
General
-
Target
v2/Main.py
-
Size
12KB
-
MD5
c95c66d421870d9f37b298dfe3f82a27
-
SHA1
1c1c180afdbc5a326016bd2cead372e2f42ca725
-
SHA256
edfb1dc2d8b72af70698cc97171a59d200ceb202db5784ca7cece2e54d54f7f1
-
SHA512
a0aaba3e2c6a212a1499998700d45d59300e4f5b724c425db88366202a54fcede6c317be1844d26780bd497cbf1dc64f444372326802acf52d55934104a01041
-
SSDEEP
3:70CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCz:7z
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\py_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2832 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2832 AcroRd32.exe 2832 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 1980 2376 cmd.exe 31 PID 2376 wrote to memory of 1980 2376 cmd.exe 31 PID 2376 wrote to memory of 1980 2376 cmd.exe 31 PID 1980 wrote to memory of 2832 1980 rundll32.exe 33 PID 1980 wrote to memory of 2832 1980 rundll32.exe 33 PID 1980 wrote to memory of 2832 1980 rundll32.exe 33 PID 1980 wrote to memory of 2832 1980 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\v2\Main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\v2\Main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\v2\Main.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5808e33240ace17bb8627de68fb89d823
SHA1d306bbac8faebd5c13988159ea18866d255b50cc
SHA2564de79045ce4182cbc93abfd8922f36bf18d0c295c82d754e5b1a61cbc4004bbb
SHA512746317ebc1ee763b0bece69af81a5e85ab7212042913c067b6c543d05dd320148bcb0438b61ef3318ce3ef3eaa90e5f172bd780d478512d8f12bd2ff80b04c10