Overview
overview
7Static
static
1Nueva carpeta.rar
windows10-ltsc 2021-x64
7Nueva carp...er.zip
windows10-ltsc 2021-x64
1Discord-To...ignore
windows10-ltsc 2021-x64
3Discord-To...NSE.md
windows10-ltsc 2021-x64
3Discord-To...DME.md
windows10-ltsc 2021-x64
3Discord-To...ain.py
windows10-ltsc 2021-x64
3Discord-To...ns.txt
windows10-ltsc 2021-x64
1Nueva carp...64.exe
windows10-ltsc 2021-x64
7Resubmissions
31/12/2024, 03:26
241231-dzfp5ssjer 731/12/2024, 03:23
241231-dxrpmavmfy 731/12/2024, 03:22
241231-dxckps1rgj 731/12/2024, 03:18
241231-dt4j1s1qgj 7Analysis
-
max time kernel
1110s -
max time network
1114s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
31/12/2024, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
Nueva carpeta.rar
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Nueva carpeta/Discord-Token-Joiner-master.zip
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Discord-Token-Joiner-master/.gitignore
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
Discord-Token-Joiner-master/LICENSE.md
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Discord-Token-Joiner-master/README.md
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
Discord-Token-Joiner-master/main.py
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral7
Sample
Discord-Token-Joiner-master/tokens.txt
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
Nueva carpeta/python-3.13.1-amd64.exe
Resource
win10ltsc2021-20241211-en
General
-
Target
Nueva carpeta/Discord-Token-Joiner-master.zip
-
Size
3KB
-
MD5
174ae01f2c742de32a737d71e7ab6a18
-
SHA1
cfe6020fd588bac259b2d711a4b4c409be304333
-
SHA256
4d330de4cd281e28ce39e9da9a44f73c5bcc0ec256983c0b1f51eed2fb293943
-
SHA512
25d092cd5447379ec0aa28d5a88168c12f8313b3fb1686504c89d814cccce6a18e9d68c14cf55a8c73c49f56c19e09fd5474edade486ea0cc987b4817618f833
Malware Config
Signatures
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-1411052346-3904498293-150013998-1000_Classes\Local Settings 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5092 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 5092 7zFM.exe Token: 35 5092 7zFM.exe Token: SeSecurityPrivilege 5092 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5092 7zFM.exe 5092 7zFM.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe 940 OpenWith.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Nueva carpeta\Discord-Token-Joiner-master.zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=5020,i,14915339153108214952,13513928827091056845,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:81⤵PID:3020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4900,i,14915339153108214952,13513928827091056845,262144 --variations-seed-version --mojo-platform-channel-handle=3704 /prefetch:81⤵PID:5052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --string-annotations=is-enterprise-managed=no --field-trial-handle=4016,i,14915339153108214952,13513928827091056845,262144 --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:81⤵PID:1892
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5408462137e2f6231ac6f44c2ce4eda7d
SHA1be21d0d6cb93232ab0f4e1bb66184ca7c495e242
SHA2567541ef3b7e31151d568c3cb18f8e5098b79c8cbb3f0935a86d6912e9f3a2d9c2
SHA512a6d7d2942fa48b2f55d52c4dc731dc754cb59e4a0fcbbb78b3deb128bf92aa504ebdfa31e74b9f4572a0fde735f4c792b4822b5eaa6134f14e6b9f3c9cd3a926
-
Filesize
746B
MD558f14c91101db143b0a90fdc8b1bf9b4
SHA1e3abd4d335d709118b615100cf57e648e9cd2b1a
SHA256b88dd5fea640870cc0ccbe582db0aa3fde782ce3978c76fcb5cf9425102ea919
SHA512683cc70a60867635a4b8473e71a3c5f47e9de1387e49da540dd031437e1fac67de2d9d859f708eb555922a8be19a7d2296460980d6ff4d322d5dfdc6cfac52db