Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 11:13
Behavioral task
behavioral1
Sample
Legends Forever - Game.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
General
-
Target
get_cookies.pyc
-
Size
9KB
-
MD5
b97f0689742bd69af8900cd3731c5294
-
SHA1
28ccff4aa6009fc86d4561e5bc37ea2fb175a689
-
SHA256
b080857887222e4c048bba2d7bb3ebc25cc26f31bb26f645fafc01de4e46a03c
-
SHA512
9b2c471688fee5cb3d1112ec0d594f5c16371dbb6a1dd30668f64746f2073cea377ca6797928e67bfc933e03c52d819ec676f00a115ef3afa4eeb240daf71883
-
SSDEEP
96:nlNatjbBMMKiNW8Zxh9ybA6HUWc4/xIgBZFLjH2K8BXFxUBvF/A7qx3MlMFztwX3:lNahBeiNR9QfUF2x3NC79F21aGaqDAht
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4488 OpenWith.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe 4488 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc1⤵
- Modifies registry class
PID:4576
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4488
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5108