Analysis
-
max time kernel
68s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
06/09/2024, 20:54
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win11-20240802-en
General
-
Target
source_prepared.pyc
-
Size
171KB
-
MD5
155e1628f3d8ae54d02a351b7a95dca8
-
SHA1
3e33bcac7b0f48d5fbc819e4fa991c6805c2881f
-
SHA256
763960ff7150e5975254a4414667178722b5a7376d70f2512da3b81e85c3d4e3
-
SHA512
bdfc8fb6530e90fd91318646c6382bd91b0e46225d16395ad06934341b4fe47f58714863330e7dd3b9e3dedd8dcbca713d9920847dcfe47ee635bf0636a4dd5d
-
SSDEEP
3072:3nzLa1eA9DSlFkoJPEtelZN+shZa/VwKgYtdnCkIF:jW1nWkoJ8cN+aZa/VwKgYt9CT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2227988167-2813779459-4240799794-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3988 OpenWith.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3988 OpenWith.exe 3164 AcroRd32.exe 3164 AcroRd32.exe 3164 AcroRd32.exe 3164 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 3164 3988 OpenWith.exe 83 PID 3988 wrote to memory of 3164 3988 OpenWith.exe 83 PID 3988 wrote to memory of 3164 3988 OpenWith.exe 83 PID 3164 wrote to memory of 3372 3164 AcroRd32.exe 86 PID 3164 wrote to memory of 3372 3164 AcroRd32.exe 86 PID 3164 wrote to memory of 3372 3164 AcroRd32.exe 86 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4768 3372 RdrCEF.exe 87 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88 PID 3372 wrote to memory of 4844 3372 RdrCEF.exe 88
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc1⤵
- Modifies registry class
PID:4220
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E7EAB98F44CE952D7893BD8424FBC612 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=C3168FD6DC8B233CCF4FEB6EF2D9CB89 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=C3168FD6DC8B233CCF4FEB6EF2D9CB89 --renderer-client-id=2 --mojo-platform-channel-handle=1780 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=7705E295DE7D158B3C42089030254F8E --mojo-platform-channel-handle=2348 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=53BC683BDCBD1D14369E4FC3E20D0641 --mojo-platform-channel-handle=1888 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=146306C926C355D7749D04E2ADD04FCD --mojo-platform-channel-handle=2452 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:4044
-
-
-