Overview
overview
10Static
static
10source_prepared.exe
windows7-x64
7source_prepared.exe
windows10-2004-x64
7discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
6source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 18:53
Behavioral task
behavioral1
Sample
source_prepared.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
source_prepared.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
source_prepared.pyc
-
Size
156KB
-
MD5
e7da6e286f372c400a622943f6cd6d13
-
SHA1
d9f9a44bc629fe4897d1702356fbf5016f6d54f5
-
SHA256
fb49e8128484e8a0f7a5d374fa18f7baa5d9b683333e7cdc2c6173e31b79551d
-
SHA512
88722f5422e50f2084a2455e89196a27a39d11cb24646d616726e33eddf9d76a2c979a6679ff7f0835a38230965cb4e645f113ed913b0c4139e41362761eeb8f
-
SSDEEP
3072:GRXtGdTS2SNNsnoz7iD6GxZhQpYDItSSsiqQU:uEdPSsoqZ6+EsWU
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3016 AcroRd32.exe 3016 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1492 2068 cmd.exe 31 PID 2068 wrote to memory of 1492 2068 cmd.exe 31 PID 2068 wrote to memory of 1492 2068 cmd.exe 31 PID 1492 wrote to memory of 3016 1492 rundll32.exe 33 PID 1492 wrote to memory of 3016 1492 rundll32.exe 33 PID 1492 wrote to memory of 3016 1492 rundll32.exe 33 PID 1492 wrote to memory of 3016 1492 rundll32.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc1⤵
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57d420a6575ecfffb2df6c606523a310b
SHA1038b8538d846226fabdbd8e8fbd1e6cadbe714b4
SHA2564cdf08b78a02910faa34adddb1390ea1fa8da0ce3a1d843de86fa4aa28ec679b
SHA5125bfdbff1eb8c1f6c3f2d1cb9d7963e3b9602e7db47dee36d88128764fa02f45864e8e59b49b1d03d4ba3f4b2ec1217d8827ccca80175b940edd91bf77d7fdc9c