Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15/10/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
discord-image-logger-main/main.py
Resource
win7-20240903-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
discord-image-logger-main/main.py
Resource
win10v2004-20241007-en
13 signatures
150 seconds
General
-
Target
discord-image-logger-main/main.py
-
Size
12KB
-
MD5
aaf65d7e0a2033b7b2e339d864c344a6
-
SHA1
aecd4b56560a61d22716128fcb3e3f0fbd018872
-
SHA256
ec4d36e40dc6806bdc7440f8656913e76833443599f58b7927088e06a1014180
-
SHA512
386db15b398556353a731c44a7ea25b60a1c898ac47e4ce352e0b0a2b9764a6673eba55e0dc2a87ff93f044205658d190fd2d0dc9234439d4e300bb7c578ee6f
-
SSDEEP
192:5xK3Qv4DPHlZ/amBgXSIOT4fN3e4vLnlTRsc4/cnlbCmQrHO+iNKDfqy0zwBQ6Qt:5x54THvSmBgvbIdAvNKlBk
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2468 2276 cmd.exe 31 PID 2276 wrote to memory of 2468 2276 cmd.exe 31 PID 2276 wrote to memory of 2468 2276 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord-image-logger-main\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord-image-logger-main\main.py2⤵
- Modifies registry class
PID:2468
-