Analysis
-
max time kernel
44s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-10-2024 20:31
Behavioral task
behavioral1
Sample
Fortnite Private Loader/Fortnite Private Loader.exe
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win10-20240404-en
General
-
Target
discord_token_grabber.pyc
-
Size
16KB
-
MD5
725de9fcbbafc763e52c1890229e95d3
-
SHA1
9f706ed61c350f634c1219a450680d8d943fab94
-
SHA256
61a871eed93301374ff8242c30e7da5ef568ba1fdd612482a0bba99583ae675f
-
SHA512
993ec6762f902ccd8753ce64a045717255aa63d7af58f0e38f997e4433ff302581479ef83a2bf0faba768981d2e471b01071de7373894fc506716571ba61e56a
-
SSDEEP
384:nGC7RYmnXavkxzG7WltcrhntQ5saa2h12VA:nGCuvk8WltcrttQ5saaCsVA
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings cmd.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 4812 NOTEPAD.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1904 OpenWith.exe -
Suspicious use of SetWindowsHookEx 23 IoCs
pid Process 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe 1904 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1904 wrote to memory of 4812 1904 OpenWith.exe 77 PID 1904 wrote to memory of 4812 1904 OpenWith.exe 77
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Modifies registry class
PID:3472
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:4812
-