Analysis

  • max time kernel
    117s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 02:53

General

  • Target

    TheBigTool-main/Settings/Program/Discord-Token-Generator.py

  • Size

    3KB

  • MD5

    a66f7a8b3e5bdb9d36ac91622b9d86dc

  • SHA1

    340be793daf4b50a4765da28e314399692bfb3e2

  • SHA256

    2b6b3cd4c3fa9be1ecaefa893f685d6519e40f3d968f77dd0b2b2adadd7b7e44

  • SHA512

    476fa3ce403f0edd86d25de98834ec3d1689b83480792882ffa3287c23d2f5f9363498d9955b1ffea36a6a98865c7adf4e8551d1c18478e742968f79cb8d6609

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Discord-Token-Generator.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Discord-Token-Generator.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2784
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\TheBigTool-main\Settings\Program\Discord-Token-Generator.py"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    55e221aeaa4b085cb09cbdf869d084b8

    SHA1

    216112705e6c15dd0591df6c599bfc57c7a529b5

    SHA256

    eb39deafdf1f4b981ee936c95ad5f494b346bef3a4ed11b825dd4a27c4e27642

    SHA512

    28874b3900de75779df89b8ccd399d9c4d32eb5cfa05e84944faa687b14956635dbf607fb2bfd36f65031010d0bad96173e2152eb9907ab51778b6700ece5bee