Analysis

  • max time kernel
    102s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:53

General

  • Target

    TheBigTool-main/Settings/Program/Discord-Token-Delete-Dm.py

  • Size

    2KB

  • MD5

    0dc8b95aaab0d0f13998bc361a637d97

  • SHA1

    2a5dd96d74833a39a18c893e0e55a29c1845c612

  • SHA256

    cc21556dcf0d9e90b49c648311cdf7c4e4366a003bbf62e7c34f843d13e4f785

  • SHA512

    bf1b88d89797187c0ec4e6e25796d3418ccc3a781ba9727ad55417c6c879648599970095c6bb92bae951e5cb653baab1e9d832e0e9b94b83cdb77face5e4084e

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Discord-Token-Delete-Dm.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Discord-Token-Delete-Dm.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Discord-Token-Delete-Dm.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    dca025b26ddc05618a12d07ba4429400

    SHA1

    939cfc205d490ea70f2d1e0abda10b69155752f1

    SHA256

    b74f4badf6e629162ea506aa5d24b4df2e8d9e20441a20370a1dba5252a38807

    SHA512

    3a12c0ecb056d7b18aabe9e3dfe3684b87b043751451b75711c6a046e30ec40e19282403f8b37e9762a423d2ee641b4c34b01ec79c57930ab986168c21589ea8