Resubmissions
15-11-2024 04:13
241115-etjqaasnck 1015-11-2024 04:08
241115-eqam7ssmgp 1015-11-2024 04:04
241115-enet5syfjq 10Analysis
-
max time kernel
442s -
max time network
1162s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-11-2024 04:04
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
get_cookies.pyc
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
misc.pyc
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
passwords_grabber.pyc
Resource
win11-20241023-en
Behavioral task
behavioral6
Sample
source_prepared.pyc
Resource
win11-20241007-en
General
-
Target
source_prepared.pyc
-
Size
65KB
-
MD5
06cd5ccd0f2f2924b4ca79e6631e8558
-
SHA1
29ff98bfef560e2832509e8b50482176d9ca7638
-
SHA256
bf6adc24a716e6a79b5f36a991a189c936e14df0a2c8cf2fea75a8a99607c2ac
-
SHA512
6148b7bd866cbf72b7a7fffcf9793b1e19149a7fbe11788400f6a47bf4342ce27dac5bb257556c4a259722e8d7b62a3a459b2fec759f8cbc7224ac2e3fbbb3dd
-
SSDEEP
1536:iaOwgVgKeAyBj1uYCFjU7x/IdBdoTupxU:Ywg2VDBkFw7xodop
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
Processes:
cmd.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2410826464-2353372766-2364966905-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
OpenWith.exepid process 912 OpenWith.exe