Resubmissions
10-12-2024 19:55
241210-ynec6a1pdm 1010-12-2024 19:54
241210-ymyems1pbl 1010-12-2024 18:24
241210-w2dbxaxrbj 10Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 19:55
Behavioral task
behavioral1
Sample
discord_token_grabber.pyc
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
General
-
Target
discord_token_grabber.pyc
-
Size
16KB
-
MD5
924ef065a5167d44170ac81a60cc6fbe
-
SHA1
ebfa171438758dd9810369d3077f618bfab5bc09
-
SHA256
78a36fae762432c89f4c0b185e5c227144817199dbde90d16749c6bfc0fb1dd1
-
SHA512
15a2144fe6e0e081856fd875bcbb239a83da115dce2cda1924f71cfc401f13f681d5047cb80b40cdcdcb617c12d9c12f7bfdc15d38177ace8685c59bb631afdc
-
SSDEEP
192:bIqqTmuEWauge+M6DA8AYv++JDcNQshU8En5W4NXOYd/G7XW:+9avP588A+DDWRm5FOUG7XW
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2964 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2964 AcroRd32.exe 2964 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2912 2956 cmd.exe 32 PID 2956 wrote to memory of 2912 2956 cmd.exe 32 PID 2956 wrote to memory of 2912 2956 cmd.exe 32 PID 2912 wrote to memory of 2964 2912 rundll32.exe 33 PID 2912 wrote to memory of 2964 2912 rundll32.exe 33 PID 2912 wrote to memory of 2964 2912 rundll32.exe 33 PID 2912 wrote to memory of 2964 2912 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2964
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b606ea70e43795e42ba2423a04a77408
SHA17aaf24e6ca0946fe891809cc8ae59f4d351287ad
SHA25612b59e6d0b6220b26d0f407702f52210746719d9fe49294532a05c24c97794c4
SHA51202cf988a61022078124af805efa69f17915e15d7edff4e539de960c228b1bf1630bbf6f613d758d29b9855916028b70e5b6947962ec6fe9bae337ed040371942