Resubmissions

23/08/2024, 07:02 UTC

240823-ht2gwa1bkf 3

23/08/2024, 07:01 UTC

240823-htecca1arg 3

Analysis

  • max time kernel
    102s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 07:01 UTC

General

  • Target

    discord-boost-bot-main/dist/pytransform/__init__.py

  • Size

    13KB

  • MD5

    58eb86eef7db4dd2a4e2ec8f52bd7521

  • SHA1

    858e8e7966a3c1756be1df24c81673b2c5e8e288

  • SHA256

    380c08b75906042d18e73b0d2654eb03043098984caa27ab454548fd93a3aa08

  • SHA512

    f0938d52fb19df5263302abba8ef9af1a4e0e80a40e7415ff82a5ab3c260eec251eeb890d0ececba7044b7d86c3b67da5b6499dce05ec8ddf591d162d29c6aa0

  • SSDEEP

    192:sIRqMEqbHCTMRNpyRW3T+3JbgDIFRuJFX9d1X2wiQvZh7kELPJdhGbc8/SHRl3RJ:sFwfIuXFXZNjlh8c

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\discord-boost-bot-main\dist\pytransform\__init__.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord-boost-bot-main\dist\pytransform\__init__.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord-boost-bot-main\dist\pytransform\__init__.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    af106917c84db6751188f3f289c7bd29

    SHA1

    35caaf41e9dc270bd1606f650481adb7ef148fff

    SHA256

    3e58d0073fc0b6944ad156d37c3eb77b072658837656bfa779db9ef43d4b3551

    SHA512

    b7fc55a2bd8b08638dc4ae464f0d6f4fc44c3c92e3c71b81315ce3b4d134e5281c2e182f17d522d542e2f10cc3eabf20d0a87b0bf75308488f9014c461be22ef

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.