Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 11:13
Behavioral task
behavioral1
Sample
Legends Forever - Game.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
General
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
aaaeca514d98795f954c1f2eebb18881
-
SHA1
6331352aada5256452c43545bb6593958602a20c
-
SHA256
a808291bd70bbd15bedd818ef25a1dbcfbf548330fd9ddf5244143ec3eb66cc6
-
SHA512
ec9c019d0061103e1e1b3db7feb346136e5e4f447804f9586aacdd7da3c9b877bda1221735b08fc44586cd443b8909664a22bb90ce3a4230402357d35fe80883
-
SSDEEP
384:nGC7RYmnXavkLPJrltcshntQ5Maa2holHVg:nGCuvkL9ltcsttQ5MaaCgHVg
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 996 OpenWith.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 996 OpenWith.exe 3692 AcroRd32.exe 3692 AcroRd32.exe 3692 AcroRd32.exe 3692 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 996 wrote to memory of 3692 996 OpenWith.exe 105 PID 996 wrote to memory of 3692 996 OpenWith.exe 105 PID 996 wrote to memory of 3692 996 OpenWith.exe 105 PID 3692 wrote to memory of 2144 3692 AcroRd32.exe 109 PID 3692 wrote to memory of 2144 3692 AcroRd32.exe 109 PID 3692 wrote to memory of 2144 3692 AcroRd32.exe 109 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 2488 2144 RdrCEF.exe 110 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111 PID 2144 wrote to memory of 3884 2144 RdrCEF.exe 111
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Modifies registry class
PID:2620
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=43337B9186A24B9C0DA735120522DED4 --mojo-platform-channel-handle=1744 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=98FF7BE42D9B64A9472C736AB62CD17A --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=98FF7BE42D9B64A9472C736AB62CD17A --renderer-client-id=2 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6FA6062AAE744607923C5087B3132E0A --mojo-platform-channel-handle=2316 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2212
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=1A6C150278632398A423244BEDE0B91C --mojo-platform-channel-handle=1812 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3948
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BC3D7E5262ADDD63A89B6E339F60300D --mojo-platform-channel-handle=2404 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:3820
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:660