Overview
overview
10Static
static
10release 2.21v.rar
windows7-x64
3release 2.21v.rar
windows10-2004-x64
3RUES.EXTv2.13v.exe
windows7-x64
7RUES.EXTv2.13v.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3_license.dat
windows7-x64
3_license.dat
windows10-2004-x64
3imgui.ini
windows7-x64
1imgui.ini
windows10-2004-x64
1readme.txt
windows7-x64
1readme.txt
windows10-2004-x64
1version.dat
windows7-x64
3version.dat
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 17:33
Behavioral task
behavioral1
Sample
release 2.21v.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
release 2.21v.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RUES.EXTv2.13v.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
RUES.EXTv2.13v.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
passwords_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
_license.dat
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
_license.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
imgui.ini
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
imgui.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
readme.txt
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
version.dat
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
version.dat
Resource
win10v2004-20240802-en
General
-
Target
_license.dat
-
Size
48B
-
MD5
54716b69a7147548f843476f9ca9b417
-
SHA1
96cdb80b43b1f37ce4a048306b5e7d4aab3f25f3
-
SHA256
71a9034cdf48193b2f3e276e30a0983ead77c3441fe0567a48b6be8ac2b42c53
-
SHA512
c94ebce3bd1132261710c763d749833adf5cda6f9533f0cc4f123f333ddb996504009e12464b10fb97a994d2c17201b2d95b1b0839f9fee9b23a010c0eba5a36
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dat_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dat_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.dat rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\.dat\ = "dat_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dat_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dat_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dat_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\dat_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2572 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2572 AcroRd32.exe 2572 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2556 2640 cmd.exe 31 PID 2640 wrote to memory of 2556 2640 cmd.exe 31 PID 2640 wrote to memory of 2556 2640 cmd.exe 31 PID 2556 wrote to memory of 2572 2556 rundll32.exe 32 PID 2556 wrote to memory of 2572 2556 rundll32.exe 32 PID 2556 wrote to memory of 2572 2556 rundll32.exe 32 PID 2556 wrote to memory of 2572 2556 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_license.dat1⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\_license.dat2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\_license.dat"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55acf08c52f39f563a1d18773531433c3
SHA11c8cb714666cbd0841badfc3b70f21cc91371b61
SHA256054cf963b6c98032b5dd1cb6f4fd487e19e96d22fb1e2dee437990647394cf26
SHA5126f19ccfe833e441283d7bf4422099fac2adc751f09623d31c131b9d196bc3c029e969d7a4ad9bb2658980c59570e7237a95e202e531251dfb4bc28de3318ea85