Overview
overview
10Static
static
10OblivionSetup.exe
windows7-x64
7OblivionSetup.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-09-2024 18:59
Behavioral task
behavioral1
Sample
OblivionSetup.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
OblivionSetup.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20240910-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
General
-
Target
source_prepared.pyc
-
Size
185KB
-
MD5
b1db92ba5b841baa67482723db981c7c
-
SHA1
5dc2f98a343c5f531f8cb415b15091cfe207e378
-
SHA256
482455243fed709eacef14a050a57917c684679436f2c334ac16dca460a04942
-
SHA512
72fbc2062d7283de7f04d83d0ed304a475b3cba8bdbcd6ec919085f3d51a02a809baabbedf222db740f5236ddb5b8ebbb225b7f42182986b0cb1c8c97996c31d
-
SSDEEP
3072:wTHRkLaiI6A9MmlbJo2PEtelZN+tVZa/zqge6/qbCkn0:wTqWiILHJo28cN+7Za/zqgeqYCh
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2996 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2996 AcroRd32.exe 2996 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1264 1960 cmd.exe 31 PID 1960 wrote to memory of 1264 1960 cmd.exe 31 PID 1960 wrote to memory of 1264 1960 cmd.exe 31 PID 1264 wrote to memory of 2996 1264 rundll32.exe 32 PID 1264 wrote to memory of 2996 1264 rundll32.exe 32 PID 1264 wrote to memory of 2996 1264 rundll32.exe 32 PID 1264 wrote to memory of 2996 1264 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fd3e726c3e355a4ddcc1c19805e5e70f
SHA1acc494dc89fa07c4ffb37aa65cebc71bf8db6f05
SHA25690e5b5b8ea96c95ea14adf11fe6d837d3e3cef42d1b4e857dbf26474d710580f
SHA512009997f2030dff3916e224ecc4fa08ea3ff0d645e2d21c48a46927f2e69fea99064ce723e6c36a14aa763a8aa2d124618b5a9e9e4425247d03f3c128c830bd99