Analysis

  • max time kernel
    93s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/09/2024, 23:16

General

  • Target

    DiscordTokenLogger-1.2/README.md

  • Size

    3KB

  • MD5

    e56eca622ff67b16eef4ec0a3f6d1db5

  • SHA1

    620aaec7722137d1d96dc5a8f06fe23f6d33f3e8

  • SHA256

    1f26b9f20e3efe979caaa0d3d380b4c0d907f0864350d738831d77a1bf0672bd

  • SHA512

    040f57f150c1dd27ceb72b0938116d9a29795d125f126c6f080a3b4926dadd1b2c94eb983480f075db2380b1c6a8449f4f077d68bea7a6a76863551858b1d719

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\DiscordTokenLogger-1.2\README.md
    1⤵
    • Modifies registry class
    PID:640
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads