Resubmissions
27/08/2024, 09:32
240827-lh5a6stgmd 1027/08/2024, 08:59
240827-kx7t6ssgmh 1027/08/2024, 08:56
240827-kv5l2asfnc 10Analysis
-
max time kernel
1887s -
max time network
2613s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/08/2024, 08:59
Behavioral task
behavioral1
Sample
AutoBeamer v1.3.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win11-20240802-en
General
-
Target
passwords_grabber.pyc
-
Size
4KB
-
MD5
8b9cbd29c3dfec519a4313b1b7a0069b
-
SHA1
5efb073593bc8908a7514dad78673c9d65344a6f
-
SHA256
589d438226abfec8f71ab7724c68011303f82febb6786fd0c57571b0769764f3
-
SHA512
c0099bcf2d23dd405b2e02e1fd1b946195015eabb1cbd2ce4896f1ab7e5bbc1fbe6600fa529087b5dc295c13219fb6bc1a6ac97efa4c0fc74901f70278c09bfd
-
SSDEEP
96:2APDnTWeYwDTgWxiX79GzTOjYUyWkUUNPIslLClDWJpR6Yn:TzCUDxiLATmeEUNP/lL3JpsYn
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2264 OpenWith.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe 2264 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc1⤵
- Modifies registry class
PID:2976
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2264