Analysis
-
max time kernel
18s -
max time network
17s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 17:24
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
discord_token_grabber.pyc
-
Size
17KB
-
MD5
e523026b612006e580e96bd9e2a8882c
-
SHA1
03b9938701f7eff11a0c3632ed805e8188598c88
-
SHA256
8ae6baddc552f9a47c488760a3d3b04f217f7c999dbffc1a548bb09532e6bf77
-
SHA512
a0f15f5edecbab4894aa3b85092fc2bde34b76f6048b198ce387d59a56d6c74969201cc43d19cd27a9ff0a6ab72268884a90ef206f0be34a5707a7f6ea24a853
-
SSDEEP
384:cGllyAavwS9F0RW807PPQviowoYbCj+Mo8WWIc02a8:cIlytvX9iRW8inQ6owoYOyM0d2a8
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1688 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 33 IoCs
pid Process 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe 2408 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2408 wrote to memory of 1688 2408 OpenWith.exe 92 PID 2408 wrote to memory of 1688 2408 OpenWith.exe 92
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Modifies registry class
PID:4376
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc2⤵
- Opens file in notepad (likely ransom note)
PID:1688
-