Overview
overview
10Static
static
10OblivionSetup.exe
windows7-x64
7OblivionSetup.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 18:59
Behavioral task
behavioral1
Sample
OblivionSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
OblivionSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
OblivionSetup.exe
-
Size
80.8MB
-
MD5
9cedad247d9159b9c24d6445494f7665
-
SHA1
b986317051fbf7da644eab99373d0963e7669755
-
SHA256
20ee527c87cdb4756892ad17681a18eebe52ccb8dd32a7268fb1f2a2bc8f4107
-
SHA512
51e64599d73e6a7ba3c219ea9b0e5411e71946d1a4fb90a128870c5dc7503184bcdd26575ae8a7b45ab6140e7687a4502159774076754223697d48931a33f670
-
SSDEEP
1572864:CvxZQglcWq6ZSk8IpG7V+VPhqYdfmE7jlgJiYgj+h58sMwV96Xo4cJX:CvxZxmv6ZSkB05awcfbeL5R9cU
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2072 OblivionSetup.exe -
resource yara_rule behavioral1/files/0x0003000000020a4e-1261.dat upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2740 wrote to memory of 2072 2740 OblivionSetup.exe 30 PID 2740 wrote to memory of 2072 2740 OblivionSetup.exe 30 PID 2740 wrote to memory of 2072 2740 OblivionSetup.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\OblivionSetup.exe"C:\Users\Admin\AppData\Local\Temp\OblivionSetup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\OblivionSetup.exe"C:\Users\Admin\AppData\Local\Temp\OblivionSetup.exe"2⤵
- Loads dropped DLL
PID:2072
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5335b4e7bf9b78b1ea902220cdb506506
SHA15ea9c9df911267392109d44a88727d3cfebb6d49
SHA2564a6a3b70293915516a4503f60d3eba8f9db22e84918e17cb09fe9f76c5a2db8b
SHA5123ba072b9acea573c0bc1819f3f434a1b0f1bd940efcbed7bb3d227ecca6cf413903815c7bb9299718db8df496c8c74c406b47f0331f2445243e09b55f8581be2