Overview
overview
10Static
static
10HackTown.exe
windows7-x64
7HackTown.exe
windows10-2004-x64
7HackTown.exe
android-9-x86
HackTown.exe
android-10-x64
HackTown.exe
android-11-x64
HackTown.exe
macos-10.15-amd64
1HackTown.exe
ubuntu-18.04-amd64
HackTown.exe
debian-9-armhf
HackTown.exe
debian-9-mips
HackTown.exe
debian-9-mipsel
discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3discord_to...er.pyc
android-9-x86
discord_to...er.pyc
android-10-x64
discord_to...er.pyc
android-11-x64
discord_to...er.pyc
macos-10.15-amd64
4discord_to...er.pyc
ubuntu-18.04-amd64
discord_to...er.pyc
debian-9-armhf
discord_to...er.pyc
debian-9-mips
discord_to...er.pyc
debian-9-mipsel
get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3get_cookies.pyc
android-9-x86
get_cookies.pyc
android-10-x64
get_cookies.pyc
android-11-x64
get_cookies.pyc
macos-10.15-amd64
1get_cookies.pyc
ubuntu-18.04-amd64
get_cookies.pyc
debian-9-armhf
get_cookies.pyc
debian-9-mips
get_cookies.pyc
debian-9-mipsel
misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3Analysis
-
max time kernel
90s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 21:25
Behavioral task
behavioral1
Sample
HackTown.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HackTown.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HackTown.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
HackTown.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
HackTown.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
HackTown.exe
Resource
macos-20240711.1-en
Behavioral task
behavioral7
Sample
HackTown.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
HackTown.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
HackTown.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
HackTown.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral11
Sample
discord_token_grabber.pyc
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
discord_token_grabber.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
discord_token_grabber.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral15
Sample
discord_token_grabber.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
discord_token_grabber.pyc
Resource
macos-20240711.1-en
Behavioral task
behavioral17
Sample
discord_token_grabber.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
discord_token_grabber.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral19
Sample
discord_token_grabber.pyc
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
discord_token_grabber.pyc
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral21
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
get_cookies.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral24
Sample
get_cookies.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral25
Sample
get_cookies.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral26
Sample
get_cookies.pyc
Resource
macos-20240711.1-en
Behavioral task
behavioral27
Sample
get_cookies.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral28
Sample
get_cookies.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral29
Sample
get_cookies.pyc
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral30
Sample
get_cookies.pyc
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral31
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
misc.pyc
Resource
win10v2004-20241007-en
General
-
Target
get_cookies.pyc
-
Size
9KB
-
MD5
b97f0689742bd69af8900cd3731c5294
-
SHA1
28ccff4aa6009fc86d4561e5bc37ea2fb175a689
-
SHA256
b080857887222e4c048bba2d7bb3ebc25cc26f31bb26f645fafc01de4e46a03c
-
SHA512
9b2c471688fee5cb3d1112ec0d594f5c16371dbb6a1dd30668f64746f2073cea377ca6797928e67bfc933e03c52d819ec676f00a115ef3afa4eeb240daf71883
-
SSDEEP
96:nlNatjbBMMKiNW8Zxh9ybA6HUWc4/xIgBZFLjH2K8BXFxUBvF/A7qx3MlMFztwX3:lNahBeiNR9QfUF2x3NC79F21aGaqDAht
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 AcroRd32.exe 2736 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2680 2176 cmd.exe 32 PID 2176 wrote to memory of 2680 2176 cmd.exe 32 PID 2176 wrote to memory of 2680 2176 cmd.exe 32 PID 2680 wrote to memory of 2736 2680 rundll32.exe 33 PID 2680 wrote to memory of 2736 2680 rundll32.exe 33 PID 2680 wrote to memory of 2736 2680 rundll32.exe 33 PID 2680 wrote to memory of 2736 2680 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD51ea76270e049112c94f4bfc8237ec965
SHA1c02c21727ddf0a18559b087a526c7e0c8d16d614
SHA2563709d223caa1b31b2199fe9182ccd0d016004ba16c3604875d7096920384cd1f
SHA5123266bd3bfe1aab981f28128ae316862f024d44f8517feb38ed7ea1c68573538653ae2d380cb124033823a18b587ce65c5efcf94d7014984e7d7deb8bb613fb8b