Overview
overview
10Static
static
10HackTown.exe
windows7-x64
7HackTown.exe
windows10-2004-x64
7HackTown.exe
android-9-x86
HackTown.exe
android-10-x64
HackTown.exe
android-11-x64
HackTown.exe
macos-10.15-amd64
1HackTown.exe
ubuntu-18.04-amd64
HackTown.exe
debian-9-armhf
HackTown.exe
debian-9-mips
HackTown.exe
debian-9-mipsel
discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3discord_to...er.pyc
android-9-x86
discord_to...er.pyc
android-10-x64
discord_to...er.pyc
android-11-x64
discord_to...er.pyc
macos-10.15-amd64
4discord_to...er.pyc
ubuntu-18.04-amd64
discord_to...er.pyc
debian-9-armhf
discord_to...er.pyc
debian-9-mips
discord_to...er.pyc
debian-9-mipsel
get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3get_cookies.pyc
android-9-x86
get_cookies.pyc
android-10-x64
get_cookies.pyc
android-11-x64
get_cookies.pyc
macos-10.15-amd64
1get_cookies.pyc
ubuntu-18.04-amd64
get_cookies.pyc
debian-9-armhf
get_cookies.pyc
debian-9-mips
get_cookies.pyc
debian-9-mipsel
misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3Analysis
-
max time kernel
43s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 21:25
Behavioral task
behavioral1
Sample
HackTown.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HackTown.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HackTown.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
HackTown.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
HackTown.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
HackTown.exe
Resource
macos-20240711.1-en
Behavioral task
behavioral7
Sample
HackTown.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
HackTown.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
HackTown.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
HackTown.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral11
Sample
discord_token_grabber.pyc
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
discord_token_grabber.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
discord_token_grabber.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral15
Sample
discord_token_grabber.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
discord_token_grabber.pyc
Resource
macos-20240711.1-en
Behavioral task
behavioral17
Sample
discord_token_grabber.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
discord_token_grabber.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral19
Sample
discord_token_grabber.pyc
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
discord_token_grabber.pyc
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral21
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
get_cookies.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral24
Sample
get_cookies.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral25
Sample
get_cookies.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral26
Sample
get_cookies.pyc
Resource
macos-20240711.1-en
Behavioral task
behavioral27
Sample
get_cookies.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral28
Sample
get_cookies.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral29
Sample
get_cookies.pyc
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral30
Sample
get_cookies.pyc
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral31
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
misc.pyc
Resource
win10v2004-20241007-en
General
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
aaaeca514d98795f954c1f2eebb18881
-
SHA1
6331352aada5256452c43545bb6593958602a20c
-
SHA256
a808291bd70bbd15bedd818ef25a1dbcfbf548330fd9ddf5244143ec3eb66cc6
-
SHA512
ec9c019d0061103e1e1b3db7feb346136e5e4f447804f9586aacdd7da3c9b877bda1221735b08fc44586cd443b8909664a22bb90ce3a4230402357d35fe80883
-
SSDEEP
384:nGC7RYmnXavkLPJrltcshntQ5Maa2holHVg:nGCuvkL9ltcsttQ5MaaCgHVg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2112 AcroRd32.exe 2112 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2960 2452 cmd.exe 31 PID 2452 wrote to memory of 2960 2452 cmd.exe 31 PID 2452 wrote to memory of 2960 2452 cmd.exe 31 PID 2960 wrote to memory of 2112 2960 rundll32.exe 32 PID 2960 wrote to memory of 2112 2960 rundll32.exe 32 PID 2960 wrote to memory of 2112 2960 rundll32.exe 32 PID 2960 wrote to memory of 2112 2960 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58cf72f8c12893924c7114c409786a41e
SHA1e47b4bec3583f5f640c7bda926f9400338dd1e9e
SHA256b0ee3329225e4c3ceac5501fa3cc240fb46f19f73777b236448b38cadd019c67
SHA5123d28884044f426997d62e1a4d03d9eaae1733fc6dad5ad81af5c20472257ef6e316f271960d73db2f51422f2bfe4f2abca2e2821dedf2937fb1e573b725bcb2b