Overview
overview
10Static
static
10HackTown.exe
windows7-x64
7HackTown.exe
windows10-2004-x64
7HackTown.exe
android-9-x86
HackTown.exe
android-10-x64
HackTown.exe
android-11-x64
HackTown.exe
macos-10.15-amd64
1HackTown.exe
ubuntu-18.04-amd64
HackTown.exe
debian-9-armhf
HackTown.exe
debian-9-mips
HackTown.exe
debian-9-mipsel
discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3discord_to...er.pyc
android-9-x86
discord_to...er.pyc
android-10-x64
discord_to...er.pyc
android-11-x64
discord_to...er.pyc
macos-10.15-amd64
4discord_to...er.pyc
ubuntu-18.04-amd64
discord_to...er.pyc
debian-9-armhf
discord_to...er.pyc
debian-9-mips
discord_to...er.pyc
debian-9-mipsel
get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3get_cookies.pyc
android-9-x86
get_cookies.pyc
android-10-x64
get_cookies.pyc
android-11-x64
get_cookies.pyc
macos-10.15-amd64
1get_cookies.pyc
ubuntu-18.04-amd64
get_cookies.pyc
debian-9-armhf
get_cookies.pyc
debian-9-mips
get_cookies.pyc
debian-9-mipsel
misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-10-2024 21:25
Behavioral task
behavioral1
Sample
HackTown.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HackTown.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
HackTown.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
HackTown.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
HackTown.exe
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral6
Sample
HackTown.exe
Resource
macos-20240711.1-en
Behavioral task
behavioral7
Sample
HackTown.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
HackTown.exe
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
HackTown.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
HackTown.exe
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral11
Sample
discord_token_grabber.pyc
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
discord_token_grabber.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
discord_token_grabber.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral15
Sample
discord_token_grabber.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
discord_token_grabber.pyc
Resource
macos-20240711.1-en
Behavioral task
behavioral17
Sample
discord_token_grabber.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
discord_token_grabber.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral19
Sample
discord_token_grabber.pyc
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
discord_token_grabber.pyc
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral21
Sample
get_cookies.pyc
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
get_cookies.pyc
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral24
Sample
get_cookies.pyc
Resource
android-x64-20240910-en
Behavioral task
behavioral25
Sample
get_cookies.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral26
Sample
get_cookies.pyc
Resource
macos-20240711.1-en
Behavioral task
behavioral27
Sample
get_cookies.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral28
Sample
get_cookies.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral29
Sample
get_cookies.pyc
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral30
Sample
get_cookies.pyc
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral31
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
misc.pyc
Resource
win10v2004-20241007-en
General
-
Target
misc.pyc
-
Size
4KB
-
MD5
3eb4ff2a9be2d13ecb7343cf82865294
-
SHA1
6f9d52b590a15de10dd4589ced7320734371b844
-
SHA256
5697249c80354c3adbbb6ae7f2068bd5e0ab44ce08def7b1ef168508fb1fb2c4
-
SHA512
776bc0e43593579b7a82bdf0ed77ba89803111b5651cf222c82a7245cd9a297560e3400dc9fcefbed56a91cde4f786f2d745e931102c4ac8750044f2f5072f63
-
SSDEEP
96:XSMlhlvSzMPDweHPF8+VB7sHIZGQSWfvmyyZ1k9zBub:iolvSzM0evq+VBXZGQlvmV1k5Bub
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
AcroRd32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 1624 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 1624 AcroRd32.exe 1624 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2372 wrote to memory of 1980 2372 cmd.exe rundll32.exe PID 2372 wrote to memory of 1980 2372 cmd.exe rundll32.exe PID 2372 wrote to memory of 1980 2372 cmd.exe rundll32.exe PID 1980 wrote to memory of 1624 1980 rundll32.exe AcroRd32.exe PID 1980 wrote to memory of 1624 1980 rundll32.exe AcroRd32.exe PID 1980 wrote to memory of 1624 1980 rundll32.exe AcroRd32.exe PID 1980 wrote to memory of 1624 1980 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\misc.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\misc.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5009614462ead225646ae61a092a30ef4
SHA119a1c46dab2c353bd6d5d9af4cae5b25f692e030
SHA256286e9a5e23bbe0f5c56f75bb4318f0eacb26fdee3673ded551192b69ee8f5ca1
SHA51255fdaad18bb5e825795b57e35556d70d36fef4c1406f3eed970e7a2bd8fe69a3318fd9968a0e8703083f43b393d7d74c8bcc6299f26f86ba94c766eb30389acb