Malware Analysis Report

2025-03-15 03:42

Sample ID 250107-wq1m3atpfl
Target source_prepared.exe
SHA256 775803a6a1f3eabddd92e0930128d0137559b93ec1659dfde48022f0cd25c5fc
Tags
pyinstaller pysilon upx phishing
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral6

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral7

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

775803a6a1f3eabddd92e0930128d0137559b93ec1659dfde48022f0cd25c5fc

Threat Level: Known bad

The file source_prepared.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx phishing

Pysilon family

Detect Pysilon

Loads dropped DLL

A potential corporate email address has been identified in the URL: [email protected]

UPX packed file

Detects Pyinstaller

Unsigned PE

Enumerates physical storage devices

Modifies registry class

Suspicious use of WriteProcessMemory

Opens file in notepad (likely ransom note)

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Uses Task Scheduler COM API

Checks processor information in registry

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2025-01-07 18:08

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral6

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

154s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\protections.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\protections.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 8.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral7

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

94s

Max time network

145s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\source_prepared.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 8.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 138.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

92s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 74.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 166.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 29.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 48.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 8.153.16.2.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI29202\python313.dll

MD5 13e0653e90a091bde333f7e652ac6f8b
SHA1 130f3271120487b4aac482af56f4de6673aaaeda
SHA256 a89f9220c5afcb81b9a91f00b3bea9ed21ebd2cbae00785cbc2db264d90c862c
SHA512 ad513df8f9a53cb3a8e5bc430a977c4079e7d7547fce43fe29288988ee458ff2ea922eb979582fe4c276e58cd6ef8d771bf6535170554b82c5d54d87caaf5366

C:\Users\Admin\AppData\Local\Temp\_MEI29202\VCRUNTIME140.dll

MD5 862f820c3251e4ca6fc0ac00e4092239
SHA1 ef96d84b253041b090c243594f90938e9a487a9a
SHA256 36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153
SHA512 2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

memory/4668-1101-0x00007FF80F7E0000-0x00007FF80FE45000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\base_library.zip

MD5 18c3f8bf07b4764d340df1d612d28fad
SHA1 fc0e09078527c13597c37dbea39551f72bbe9ae8
SHA256 6e30043dfa5faf9c31bd8fb71778e8e0701275b620696d29ad274846676b7175
SHA512 135b97cd0284424a269c964ed95b06d338814e5e7b2271b065e5eabf56a8af4a213d863dd2a1e93c1425fadb1b20e6c63ffa6e8984156928be4a9a2fbbfd5e93

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_ctypes.pyd

MD5 820451c7be66ef544219c74ee35007d0
SHA1 0e3e3cf7659eff9d46072614461e71076d14dd3e
SHA256 90777ea54bda95e8787f539e49a8e56c9228b1059bb4e47935799d55d54cf53e
SHA512 092c741f1081c5e9c5aec87252561e6b30b7513bc0aa93df2ea85d8f50eec7a1918c6a7c09c682175a04e09649129cd7d07cfaa24967295a2a1f893bc080a45a

C:\Users\Admin\AppData\Local\Temp\_MEI29202\python3.DLL

MD5 ad2c4784c3240063eeaa646fd59be62c
SHA1 5efab563725781ab38a511e3f26e0406d5d46e8d
SHA256 c1de4bfe57dc4a5be8c72c865d617dc39dfd8162fcd2ce1fac9f401cf9efb504
SHA512 c964d4289206d099310bd5299f71a32c643311e0e8445e35ae3179772136d0ca9b75f5271eaf31efc75c055cd438799cef836ed87797589629b0e9f247424676

memory/4668-1109-0x00007FF81E500000-0x00007FF81E527000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

memory/4668-1111-0x00007FF81EEC0000-0x00007FF81EECF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_bz2.pyd

MD5 041c3a1ba71868d4daeb6d0906a38b28
SHA1 8aa225f0fc86534c2c6526004afdb5d652717daf
SHA256 025ec23249cb7fec75178b51627fbb57bbe1f55adb294353e22c4ce153801345
SHA512 54e790335fe76505c710b7039bbcb37b25d4325b279e216135b75af9221cc3061b7cf55fab8b3fb5c684af9890c6394bb4a44d7e27a667aefeb5b50144bd7608

memory/4668-1114-0x00007FF81E6D0000-0x00007FF81E6E9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_lzma.pyd

MD5 00e041a28fc678b2f474808a57445730
SHA1 bc9978a238ef64de05ab875ef6683668cd1185ba
SHA256 2837e89c9223d5c810c61ed1f866c662189d2543af9a6f75d75e7fb564f32316
SHA512 c71954efff4e29b9c0ac33373062e7c7bbb4e5ad02f75264765e077a1445821a4891e0a50722cd975cc27d489e873f0e1f4cba2e0b24ac75f8601efd8892a4f3

memory/4668-1117-0x00007FF81E4D0000-0x00007FF81E4FB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\libcrypto-3.dll

MD5 ecf92d1e849c1a4b89ed9dac0c2d732d
SHA1 bd2dbf194e9c891f27ef5b4521318d3804f76425
SHA256 afc166f8f1906cd75b4de9f7c72e92e36e4282437a02fedadb5ec3145c33c3a1
SHA512 44e3d6b37a11b715efb77c28c1c4fca4c25ba7f663183bcef4ba52e9c5271715f43f7b22b6307c6d8788c1ea4e8b709060b0a711aeae249164ba7bfd1d571f89

C:\Users\Admin\AppData\Local\Temp\_MEI29202\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI29202\libssl-3.dll

MD5 5b63295552454d570281d321e4ca7266
SHA1 d849e5c470d63953ec55f2d732fd6f611cb2c655
SHA256 cff180ce2bcf7daa19d6f3702e416f54a55eebfaff382f4b6d8ee00c0954b861
SHA512 a2286ca195b5a8287e8fbee6d20678e3bbefc7eb20f89e510bc94801239d08c8ea620603254fbfc6c6c0d5306dc38dc1f78a675d62e9bbb8a625ec4f7b894930

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_wmi.pyd

MD5 e8db577f519980870f7654f01da421a5
SHA1 4a885bfded4ffdc343f716ba0ce23f9e8c404a06
SHA256 2d695f830a3db82bc8dc95ef026128def3fccbc883daff1c642e3563a56b4035
SHA512 40739aec59851350b9e40405762b9c6e7caba2331ac8ab72ecc704950eea2ddabd48609788b02a3fe2eac18a63d32c8b19eddf83ca3dd4a41019ad22d900b005

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_uuid.pyd

MD5 b5f2d9353f758e1a60e67dac33debdd2
SHA1 edae6378d70b76846329fa609483de89531bcf16
SHA256 cde836ef0bde1c15c1c3750de54b50d2285864c512abbfc9e2c94f0ff5aa5ca2
SHA512 9d780a8ec760c6bae3b53079c9a0670c7cbf2af6aababda0234ee71c5e0546b501cbe9666d973eaa28fb7fb7285814ecfece98d20cf4a86d3aea9a61a8120397

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_tkinter.pyd

MD5 1cf9b90a97c2bedb287cb17b8555ca1f
SHA1 d4f9c64b3589720fb3fea8344b77382a594bf81c
SHA256 3d3e6d8a414cb3012dbe89a53f8ca4b0317369fd596374b0e630ee2c895d6ffa
SHA512 026b13aea982f706522d69e0e8ec8acd45bb585b0eb21a6cc63e072909573ab9c7d0628640a7bdfbcfd41585f60017c788195d2373ff95bbff0e307f1395aeba

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_ssl.pyd

MD5 b42dca9bc4fd061f569b1be103569017
SHA1 b7c90c9745609db1628635d2fd24c18765e0b783
SHA256 9db89d5ae27e94fc52e27c8d5237388fb3216cee03e26b40b8b9269ae80dd56c
SHA512 5923bab51efa9d6b498a44332fab4101691cf7c5f8045a5325c9269c5dbe619ebcece13cb1244eca8289d8e6efc5d595010f5365fe69605797d358a97b299551

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_sqlite3.pyd

MD5 dc4f17455b3f1a3dae32a156c63c1c4c
SHA1 377ecf0d82afa7e08c42aadb1f00689ff3ed8fa5
SHA256 b56a004c7c5aaf090c59ea042772ed5843389778281614e1403258e655bfbbf0
SHA512 b32d8a795c4d7c888d9097c6970da2fcbe63eb6bf64211d677f850c6723521f0da09ea6b507ef57b891123b720c55919e53ff19dfcf2b5297d1fddb77dab84b7

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_socket.pyd

MD5 15292148065dcb1a3a676cfb0fba9252
SHA1 a22013b8565e6e1c5002b5cedcb9e016ce0e5ed2
SHA256 da7535cd642d3471e4a1f09502990bc1a48f481410191120b63d4f72e92889df
SHA512 a51bb276e81c6d12f8c10fff5a835fdff72461567a963f5d5e00c2228d9cb9b749c4ec7bf0e4e771f7260532c54ccb30dc761d3806393e9b3888fa65ee710014

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_queue.pyd

MD5 e407184680371e5c373a6faa1f108eb5
SHA1 f077adfa699a0c9cf8581c49d36133d76b154f9c
SHA256 4bcdabc2324bf8c58d6df755849b9c1aec376aa791f5f489a09d721862587d8a
SHA512 02f9a791d787f72be2fba6caca49ebbf1612182569818d76853e8055102b2509aa63765d28b0ba1cf2e8a8cbca61294e0786c47c8ae031ded01a90a1ed9dd5cf

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_overlapped.pyd

MD5 0180bef91b8bb60482d47b262aa2d1ba
SHA1 081cc0cd82e139186b85925b0c7900d3bc6ddb0e
SHA256 f438edcf20ca33551ceb13098e286867fd38faafe641faabb6cdd4989c0f4839
SHA512 fd28c249ebaba6024722a11ee8b59ddc088ef9f98ae80253262f0f91311f38c2a1e30f0b66ad2093746f0357ada04914df24df7a5c5a8a609d48b22190c1f93b

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_multiprocessing.pyd

MD5 b0ef20eb26df702d73b6031d7133afff
SHA1 fedf6bac4fecb2ecd3629d089351963ba1cf5a62
SHA256 06f031aead975e49c9b27e24a400ad5da0db36e49bc872f908b1e78af3576312
SHA512 47d3be3d2c90cb43ebeb06f73a8aef802f0c3a8c6bb94b650db46280320b546ebfa770fea074a70664fabb1b3a1a1965ba88dd0008b33625556618527d4c7354

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_hashlib.pyd

MD5 9451d1af86aebc8cc5afeee722ca057f
SHA1 797c3d1c2560635646f520c9660495b4ca52f567
SHA256 469699516ce6bab5dac11458c6d72287987139c662d650d4ff0325b95edf1a37
SHA512 ab27813e03654b0027ecc1fc89eef8997263cd10f3e0b8ccaa9213528c21c244a785a0418bd0aa162fd4dd5b8ef8f43b398b08f03c10f25cfa84f7cb30c3cb9d

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_elementtree.pyd

MD5 bd959756587cc307f27ebbe0be66a0ed
SHA1 c8c9d41dccb2185ff3e75fc50942f6de62884090
SHA256 cb0b8c8b085b72382c5d525fd4222a07513eccc941f85670eb48f848aedb3025
SHA512 e17f58ec0178ab3481c0a59ee5e78bd1dcbb91865a153afff4e664c57494107a26336217558b89099709eff7de88290e849ce77c0439f370bd2037258701cc88

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_decimal.pyd

MD5 cdf3648d66e392f550790fd3ed25d9de
SHA1 13c7bfd51f28b956afa136d1f0f85bb526180c71
SHA256 80c10c4e57f4e5ea08a6886b1906adb56477d366fe6264110e9c9752865caee2
SHA512 cd08300405d5e26f24d9770c9706b8f77aa9feaa5863c73c1aa54a3b28512656ac4ea9b98de1343a3aa3c8722726402b566db3d38f6f7428e4aa4f9fda1313de

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_cffi_backend.cp313-win_amd64.pyd

MD5 345b9e4fe71e70b8188a739bab2f6163
SHA1 3c88da659602a8dfb07602e36221ab4185010530
SHA256 56dd9d1092fffdefc47b5963ee9d8ba2a9a8270d959fe00d43e927300abdee94
SHA512 dd929cf31678924435736011cdb06a2cf77cbac300874621bda1f67f7857d1aa84523d15231891eb74f66019efa4d0e7aee640f92293436205cddc74062ef899

C:\Users\Admin\AppData\Local\Temp\_MEI29202\_asyncio.pyd

MD5 c5031bc5c34e95446adb68cba92345d3
SHA1 f524fde03dfef13799d5ddb4758a7386031580d9
SHA256 863696947c1988772f279581619017fa6995123c4db6f32298aa43f481952abc
SHA512 12223fe85d78f1d714095669966d6d8b0af98410b55034cc36c47e2c2334db23e79bbf007214e3d48d49f30516dd44382431b7fbf04f585931b66057f777b98c

C:\Users\Admin\AppData\Local\Temp\_MEI29202\zlib1.dll

MD5 946e3c39f3e72090c4d6e304c07d5a1c
SHA1 28fb74f480eda8f5f6fd8fbecf832055dee3164e
SHA256 811157c4231e149926e8ba437023a28af116c324ece44f0bc67ae65773e739ea
SHA512 fca05186cf2154baca574ad32c98a1ff6a74ab5c0e628e458c4750d86791283bd84f11e0d6b683afd20612dc9eb5af9ec76db614dec0a9bdb655be43ece00953

C:\Users\Admin\AppData\Local\Temp\_MEI29202\VCRUNTIME140_1.dll

MD5 68156f41ae9a04d89bb6625a5cd222d4
SHA1 3be29d5c53808186eba3a024be377ee6f267c983
SHA256 82a2f9ae1e6146ae3cb0f4bc5a62b7227e0384209d9b1aef86bbcc105912f7cd
SHA512 f7bf8ad7cd8b450050310952c56f6a20b378a972c822ccc253ef3d7381b56ffb3ca6ce3323bea9872674ed1c02017f78ab31e9eb9927fc6b3cba957c247e5d57

C:\Users\Admin\AppData\Local\Temp\_MEI29202\unicodedata.pyd

MD5 76881bdbbb48838e8a36f64bec40fb80
SHA1 104a38c9c2511d871cd45ef277faac1e759088f6
SHA256 25eae5b47bab5298671b93d9b53e50ebe22297baec244f9ba6e1931dab5b933b
SHA512 57e31c51813da51b6a79fea08078066385febfc9d98c2dac3a89d174042073c7b6435817786fc7de331f4af40d8589623da267f43bab011e998a201c1b334133

C:\Users\Admin\AppData\Local\Temp\_MEI29202\tk86t.dll

MD5 fe0d1b988dbbfafea11bf2749d4b9be7
SHA1 2d16476968fb625e6ace43c9d460de29a12c6448
SHA256 7390d7085f1676b305fc5ca82e4f0100f66f10a52cd6c3e8b9eb18f7d1f7e7d5
SHA512 76990274b88e4dd16f5ea72c3374b6c1d65369d03f0665bcd39ac491fdab18aa9810fa4ea20cd1ecdf0785562654c6951adcf4b3ff9c7072b97a6eb9938f24a1

C:\Users\Admin\AppData\Local\Temp\_MEI29202\tcl86t.dll

MD5 a4e87ae80147dbcbdc8dccd621155111
SHA1 9627d351dc62033e70b874039646517097a597cc
SHA256 f351c924298cb79277e4b2e31383134871d3289731e2c0ac1f80fa5f956d895b
SHA512 06427faec363c2d33dc6c2f1d1f581efe386e0f35e193fa0d9d16844cac129ad09f9b0f95e60818193d193651c97752465f05bf74feb28036f21464bd42d685b

C:\Users\Admin\AppData\Local\Temp\_MEI29202\sqlite3.dll

MD5 f248ea87e0a706a8d0f684aa8e669e7b
SHA1 f766c1fcaec1d6cb3615a05a1cb1518299ba6033
SHA256 e73f6ab56e6775df160dd54f763e58b8b8c704f4d6cf7c99c2a26b900680cfd7
SHA512 394eca85ffbfe3c2b74204b0f53c315e8222629d7fe11e1d699b045421125d0cb5a81e612221c5ac191bf258584ea81e5a657f10a0abff6d8bbc3726925860ce

C:\Users\Admin\AppData\Local\Temp\_MEI29202\select.pyd

MD5 2cee7de8fcb3d3dbc4c556b0ef6fc714
SHA1 f9c6af3856940b2673915fb59921dc8310c46e0c
SHA256 a0eaecc78e90a413c6f8b3f062a16c1c22ee517e81f2f56e4ff9746d952709e2
SHA512 f40ee75921ae6ddb65fc09d144ea2e79c91ca016382d1f21558c0ba479f5aabd41277b0c0d0aa37fd002a78acc853efdf8ded36bd1658be659c7a04349a7fca6

C:\Users\Admin\AppData\Local\Temp\_MEI29202\pyexpat.pyd

MD5 ae04c639b594155249d5c46706168c8c
SHA1 05a4699704ca070f338a3e6c03216cd2556bcdcf
SHA256 0c38d13d0818eb9091cd8311d1b162c6387dad0fbc08789f7bc2027ce2f55a04
SHA512 600b0b585f4b02363ae62a4d9910db4e3bafbe1c546e86e148fc880fe760c01a966517969f52f84e5486c41392dc43e48211aa2db34c48c5d57adad3e8ae95f0

memory/4668-1144-0x00007FF81E4B0000-0x00007FF81E4C4000-memory.dmp

memory/4668-1146-0x00007FF80F2A0000-0x00007FF80F7D3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\psutil\_psutil_windows.pyd

MD5 ddb71f0a1367202aeb5b84e981a0ffa3
SHA1 be218c8c7be7fc35d51d2fd6bc42fc6bd964b1fb
SHA256 d426f7f1432ec3c223a6186925d25439dd5d7e7b5a050f63b7bb6b240c02a7aa
SHA512 e4c0cf7e5302db930313805008280b2e1485d545596d2693306f01562c17fb5dd4e293eae7da9be62de65e0fa89b5a1c85ef9b574e1cc3d6c5630a74ddab4833

memory/4668-1153-0x00007FF81E470000-0x00007FF81E488000-memory.dmp

memory/4668-1151-0x00007FF81E7B0000-0x00007FF81E7BD000-memory.dmp

memory/4668-1148-0x00007FF81E490000-0x00007FF81E4A9000-memory.dmp

memory/4668-1159-0x00007FF81E500000-0x00007FF81E527000-memory.dmp

memory/4668-1158-0x00007FF81DB10000-0x00007FF81DBDE000-memory.dmp

memory/4668-1157-0x00007FF81E2E0000-0x00007FF81E313000-memory.dmp

memory/4668-1156-0x00007FF80F7E0000-0x00007FF80FE45000-memory.dmp

memory/4668-1161-0x00007FF81E5C0000-0x00007FF81E5CD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\charset_normalizer\md.cp313-win_amd64.pyd

MD5 499b4daf2025955396752d47aa542cbf
SHA1 40eda0bfe656c8dedad6483ff6dfcde4a3c09dee
SHA256 2d500e623d0050012e3b029b6c1814e2464ea9941d07208d6daf0ddcd5adbd99
SHA512 6e39a8b0ce27eede4d866b793c74c8e40c98739d3862f68aad28100f33f681e7a94e21942e0d03e1f06ee5d54d500796f54873b5ab149ef1428a831a7d367c1c

memory/4668-1165-0x00007FF81E6D0000-0x00007FF81E6E9000-memory.dmp

memory/4668-1166-0x00007FF81E2D0000-0x00007FF81E2DB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\charset_normalizer\md__mypyc.cp313-win_amd64.pyd

MD5 9208758928c24cb740814f165c5786c5
SHA1 ea0b69e885025828b01feab2914aba6f1e41c201
SHA256 2b6122c6b98155587a7da8a1dcbca4a35d17afbac6302ee52e04e3388ef85a24
SHA512 4ef7a1126c99351e82cf943787586f65b2dddfd0b42f98eddbdf1cc69a20b5467971ad36da5fc4203683e33249fa6ee1bd5a0de9563d90f7f1b7c504d9dfe4f8

memory/4668-1169-0x00007FF81E040000-0x00007FF81E068000-memory.dmp

memory/4668-1168-0x00007FF81E4D0000-0x00007FF81E4FB000-memory.dmp

memory/4668-1172-0x00007FF81E4B0000-0x00007FF81E4C4000-memory.dmp

memory/4668-1173-0x00007FF81DA50000-0x00007FF81DB03000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\certifi\cacert.pem

MD5 52a8319281308de49ccef4850a7245bc
SHA1 43d20d833b084454311ca9b00dd7595c527ce3bb
SHA256 807897254f383a27f45e44f49656f378abab2141ede43a4ad3c2420a597dd23f
SHA512 2764222c0cd8c862906ac0e3e51f201e748822fe9ce9b1008f3367fdd7f0db7cc12bf86e319511157af087dd2093c42e2d84232fae023d35ee1e425e7c43382d

C:\Users\Admin\AppData\Local\Temp\_MEI29202\Crypto\Cipher\_raw_ecb.pyd

MD5 1dfafb0703e7e2a4c69b07dc26e02d6a
SHA1 c81d67803d11661b95c5deb3bf67bf012b0042be
SHA256 3814206c295e84122211f8d123a2467005acb18e48bf3cc8d673fedd26680313
SHA512 816d3b71e3a5f40131073048afbe303fe75ca86a027d5485d06114be05ae2df01242ed9dfafa7c93ca0f8e79a77c20d5257fc7a22bacfff7d9bc60ce7d07bbc4

C:\Users\Admin\AppData\Local\Temp\_MEI29202\Crypto\Cipher\_raw_cbc.pyd

MD5 270fd535f94a87b973874b33f35e5af8
SHA1 bb7113a47070b629e878502fc1d929879850856b
SHA256 b7ab0516b698a9f4ef50f08ef53af907c83d841d117af16ca742b7e186d3ef51
SHA512 829dc409327562736b7d58df6e5e78e8e7595b08fa2c5a993a595032386946ccdf1ef62311c44ffbc31c41165511b40251457a0cf7b92ecec3342850876e5d31

memory/4668-1181-0x00007FF80F2A0000-0x00007FF80F7D3000-memory.dmp

memory/4668-1184-0x00007FF81E030000-0x00007FF81E03B000-memory.dmp

memory/4668-1183-0x00007FF81E020000-0x00007FF81E02B000-memory.dmp

memory/4668-1182-0x00007FF81E280000-0x00007FF81E28F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI29202\Crypto\Cipher\_raw_cfb.pyd

MD5 778a2ded9a84ad9759141c285e915b11
SHA1 2915fb4ca42d79ee32859d67c1299c0e4dfc32e7
SHA256 bb6d327d0e42d953a318a7a97953b0e530a0164a610fcab9a098ef9b407ee8a7
SHA512 4c3f7945f97a57f74765e064050cfb6a1dd6abcffe1e2a8ce19132709c1dc554562efe188be4357202b6e3ea1998dc75cca4804684b47904547044db5574be67

memory/4668-1186-0x00007FF81DA40000-0x00007FF81DA4C000-memory.dmp

memory/4668-1187-0x00007FF81DA30000-0x00007FF81DA3B000-memory.dmp

memory/4668-1189-0x00007FF81DA20000-0x00007FF81DA2C000-memory.dmp

memory/4668-1209-0x00007FF81A250000-0x00007FF81A26B000-memory.dmp

memory/4668-1208-0x00007FF81A270000-0x00007FF81A292000-memory.dmp

memory/4668-1207-0x00007FF81A2A0000-0x00007FF81A2B4000-memory.dmp

memory/4668-1206-0x00007FF81A2C0000-0x00007FF81A2D2000-memory.dmp

memory/4668-1205-0x00007FF81A2E0000-0x00007FF81A2F6000-memory.dmp

memory/4668-1204-0x00007FF81D910000-0x00007FF81D91C000-memory.dmp

memory/4668-1203-0x00007FF81D6B0000-0x00007FF81D6C2000-memory.dmp

memory/4668-1202-0x00007FF81D920000-0x00007FF81D92D000-memory.dmp

memory/4668-1201-0x00007FF81D930000-0x00007FF81D93B000-memory.dmp

memory/4668-1200-0x00007FF81DA40000-0x00007FF81DA4C000-memory.dmp

memory/4668-1199-0x00007FF81D940000-0x00007FF81D94C000-memory.dmp

memory/4668-1198-0x00007FF81D950000-0x00007FF81D95B000-memory.dmp

memory/4668-1197-0x00007FF81D960000-0x00007FF81D96B000-memory.dmp

memory/4668-1196-0x00007FF81D970000-0x00007FF81D97C000-memory.dmp

memory/4668-1195-0x00007FF81E040000-0x00007FF81E068000-memory.dmp

memory/4668-1194-0x00007FF81D980000-0x00007FF81D98E000-memory.dmp

memory/4668-1193-0x00007FF81D9F0000-0x00007FF81D9FD000-memory.dmp

memory/4668-1192-0x00007FF81DA00000-0x00007FF81DA0C000-memory.dmp

memory/4668-1191-0x00007FF81DA10000-0x00007FF81DA1B000-memory.dmp

memory/4668-1190-0x00007FF81DB10000-0x00007FF81DBDE000-memory.dmp

memory/4668-1188-0x00007FF81E2E0000-0x00007FF81E313000-memory.dmp

memory/4668-1210-0x00007FF815CF0000-0x00007FF815D08000-memory.dmp

memory/4668-1212-0x00007FF80F230000-0x00007FF80F241000-memory.dmp

memory/4668-1211-0x00007FF80F250000-0x00007FF80F29D000-memory.dmp

memory/4668-1213-0x00007FF80F1F0000-0x00007FF80F222000-memory.dmp

memory/4668-1214-0x00007FF80F1D0000-0x00007FF80F1EE000-memory.dmp

memory/4668-1221-0x00007FF80F2A0000-0x00007FF80F7D3000-memory.dmp

memory/4668-1262-0x00007FF81E470000-0x00007FF81E488000-memory.dmp

memory/4668-1261-0x00007FF81E7B0000-0x00007FF81E7BD000-memory.dmp

memory/4668-1260-0x00007FF81E490000-0x00007FF81E4A9000-memory.dmp

memory/4668-1268-0x00007FF80F1D0000-0x00007FF80F1EE000-memory.dmp

memory/4668-1267-0x00007FF81A250000-0x00007FF81A26B000-memory.dmp

memory/4668-1266-0x00007FF81A270000-0x00007FF81A292000-memory.dmp

memory/4668-1265-0x00007FF81A2A0000-0x00007FF81A2B4000-memory.dmp

memory/4668-1264-0x00007FF81A2C0000-0x00007FF81A2D2000-memory.dmp

memory/4668-1263-0x00007FF81A2E0000-0x00007FF81A2F6000-memory.dmp

memory/4668-1259-0x00007FF81E030000-0x00007FF81E03B000-memory.dmp

memory/4668-1258-0x00007FF81E4B0000-0x00007FF81E4C4000-memory.dmp

memory/4668-1257-0x00007FF81E4D0000-0x00007FF81E4FB000-memory.dmp

memory/4668-1256-0x00007FF81E6D0000-0x00007FF81E6E9000-memory.dmp

memory/4668-1255-0x00007FF81EEC0000-0x00007FF81EECF000-memory.dmp

memory/4668-1254-0x00007FF81E500000-0x00007FF81E527000-memory.dmp

memory/4668-1253-0x00007FF81D980000-0x00007FF81D98E000-memory.dmp

memory/4668-1252-0x00007FF80F1F0000-0x00007FF80F222000-memory.dmp

memory/4668-1251-0x00007FF80F230000-0x00007FF80F241000-memory.dmp

memory/4668-1250-0x00007FF80F250000-0x00007FF80F29D000-memory.dmp

memory/4668-1249-0x00007FF815CF0000-0x00007FF815D08000-memory.dmp

memory/4668-1248-0x00007FF81D910000-0x00007FF81D91C000-memory.dmp

memory/4668-1247-0x00007FF81D6B0000-0x00007FF81D6C2000-memory.dmp

memory/4668-1246-0x00007FF81D920000-0x00007FF81D92D000-memory.dmp

memory/4668-1245-0x00007FF81D930000-0x00007FF81D93B000-memory.dmp

memory/4668-1244-0x00007FF81D940000-0x00007FF81D94C000-memory.dmp

memory/4668-1243-0x00007FF81D950000-0x00007FF81D95B000-memory.dmp

memory/4668-1242-0x00007FF81D960000-0x00007FF81D96B000-memory.dmp

memory/4668-1241-0x00007FF81D970000-0x00007FF81D97C000-memory.dmp

memory/4668-1239-0x00007FF81D9F0000-0x00007FF81D9FD000-memory.dmp

memory/4668-1238-0x00007FF81DA00000-0x00007FF81DA0C000-memory.dmp

memory/4668-1237-0x00007FF81DA10000-0x00007FF81DA1B000-memory.dmp

memory/4668-1236-0x00007FF81DA20000-0x00007FF81DA2C000-memory.dmp

memory/4668-1235-0x00007FF81DA30000-0x00007FF81DA3B000-memory.dmp

memory/4668-1234-0x00007FF81DA40000-0x00007FF81DA4C000-memory.dmp

memory/4668-1233-0x00007FF81E020000-0x00007FF81E02B000-memory.dmp

memory/4668-1231-0x00007FF81E280000-0x00007FF81E28F000-memory.dmp

memory/4668-1230-0x00007FF81DA50000-0x00007FF81DB03000-memory.dmp

memory/4668-1229-0x00007FF81E040000-0x00007FF81E068000-memory.dmp

memory/4668-1228-0x00007FF81E2D0000-0x00007FF81E2DB000-memory.dmp

memory/4668-1227-0x00007FF81E5C0000-0x00007FF81E5CD000-memory.dmp

memory/4668-1226-0x00007FF81DB10000-0x00007FF81DBDE000-memory.dmp

memory/4668-1225-0x00007FF81E2E0000-0x00007FF81E313000-memory.dmp

memory/4668-1215-0x00007FF80F7E0000-0x00007FF80FE45000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

141s

Max time network

150s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

Signatures

A potential corporate email address has been identified in the URL: [email protected]

phishing

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision C:\Program Files\Mozilla Firefox\firefox.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz C:\Program Files\Mozilla Firefox\firefox.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings C:\Program Files\Mozilla Firefox\firefox.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A
Token: SeDebugPrivilege N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A
N/A N/A C:\Program Files\Mozilla Firefox\firefox.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 1516 wrote to memory of 2704 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 4664 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe
PID 2704 wrote to memory of 3940 N/A C:\Program Files\Mozilla Firefox\firefox.exe C:\Program Files\Mozilla Firefox\firefox.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\discord_token_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\source_prepared.txt

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe"

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {271763e4-ca3f-469e-8bc1-dbdee167e921} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" gpu

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2444 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2408 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03f8e201-58cb-41d2-b664-33e715300554} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" socket

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3036 -childID 1 -isForBrowser -prefsHandle 2788 -prefMapHandle 2784 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8378eb31-c529-4e55-8192-23f5b56b905b} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -childID 2 -isForBrowser -prefsHandle 3924 -prefMapHandle 3920 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {aa6c733f-43f7-4e3f-9f79-1b02b09fa88f} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4900 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4888 -prefMapHandle 4880 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e228ef58-2106-4202-be42-c77e24cb692c} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" utility

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5408 -prefMapHandle 5404 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e30e284c-6a6d-4c2f-a859-1a0bd0bf256e} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 4 -isForBrowser -prefsHandle 5552 -prefMapHandle 5560 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a77b089-a4d4-4b81-ae52-d2fe33092064} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5344 -childID 5 -isForBrowser -prefsHandle 5724 -prefMapHandle 5732 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c60cc419-09dd-4c9f-b144-e3eab80a2d02} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5984 -childID 6 -isForBrowser -prefsHandle 5976 -prefMapHandle 5408 -prefsLen 28044 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86e48e36-1555-4f32-81f1-7e3be1fd6764} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1768 -childID 7 -isForBrowser -prefsHandle 6204 -prefMapHandle 5984 -prefsLen 28044 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1256b952-69d1-42b4-8a34-09c3d84f3c5c} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6320 -parentBuildID 20240401114208 -prefsHandle 6476 -prefMapHandle 6472 -prefsLen 34627 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cfe93253-a6c8-4a23-8f6d-3ab59b9168f1} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" rdd

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6604 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 6600 -prefMapHandle 6596 -prefsLen 34627 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b8c0e88-6f4b-4a76-9adf-ea6f4557919d} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" utility

C:\Program Files\Mozilla Firefox\firefox.exe

"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6448 -childID 8 -isForBrowser -prefsHandle 6812 -prefMapHandle 6808 -prefsLen 28044 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e647913-edd0-4c81-bc90-186c0da919c0} 2704 "\\.\pipe\gecko-crash-server-pipe.2704" tab

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 8.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 167.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 spocs.getpocket.com udp
US 8.8.8.8:53 firefox-api-proxy.cdn.mozilla.net udp
N/A 127.0.0.1:51990 tcp
US 34.149.97.1:443 firefox-api-proxy.cdn.mozilla.net tcp
US 8.8.8.8:53 firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.ads.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.ads.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 34.149.97.1:443 firefox-api-proxy-prod.pocket.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.content-signature-chains.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 shavar.prod.mozaws.net udp
US 8.8.8.8:53 shavar.prod.mozaws.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 firefox-settings-attachments.cdn.mozilla.net udp
US 8.8.8.8:53 64.50.235.44.in-addr.arpa udp
US 34.117.121.53:443 firefox-settings-attachments.cdn.mozilla.net tcp
US 8.8.8.8:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 attachments.prod.remote-settings.prod.webservices.mozgcp.net udp
N/A 127.0.0.1:51998 tcp
US 8.8.8.8:53 location.services.mozilla.com udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 35.190.72.216:443 location.services.mozilla.com tcp
US 8.8.8.8:53 prod.classify-client.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 prod.balrog.prod.cloudops.mozgcp.net udp
US 8.8.8.8:53 prod.classify-client.prod.webservices.mozgcp.net udp
US 35.190.72.216:443 prod.classify-client.prod.webservices.mozgcp.net udp
US 8.8.8.8:53 ciscobinary.openh264.org udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 88.221.134.209:80 ciscobinary.openh264.org tcp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
GB 142.250.187.206:443 redirector.gvt1.com tcp
US 8.8.8.8:53 redirector.gvt1.com udp
US 8.8.8.8:53 a19.dscg10.akamai.net udp
US 8.8.8.8:53 redirector.gvt1.com udp
GB 142.250.187.206:443 redirector.gvt1.com udp
US 8.8.8.8:53 r4---sn-aigzrnsz.gvt1.com udp
GB 74.125.175.169:443 r4---sn-aigzrnsz.gvt1.com tcp
US 8.8.8.8:53 r4.sn-aigzrnsz.gvt1.com udp
US 8.8.8.8:53 r4.sn-aigzrnsz.gvt1.com udp
GB 74.125.175.169:443 r4.sn-aigzrnsz.gvt1.com udp
US 8.8.8.8:53 201.181.244.35.in-addr.arpa udp
US 8.8.8.8:53 216.72.190.35.in-addr.arpa udp
US 8.8.8.8:53 209.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 206.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 169.175.125.74.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:443 www.google.com tcp
US 8.8.8.8:53 www.google.com udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.187.196:443 www.google.com udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 196.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 195.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 csp.withgoogle.com udp
US 8.8.8.8:53 2.180.250.142.in-addr.arpa udp
GB 142.250.187.241:443 csp.withgoogle.com tcp
US 8.8.8.8:53 csp.withgoogle.com udp
US 8.8.8.8:53 csp.withgoogle.com udp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
GB 142.250.180.10:443 ogads-pa.googleapis.com tcp
GB 142.250.180.10:443 ogads-pa.googleapis.com tcp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
GB 142.250.187.241:443 csp.withgoogle.com udp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
GB 142.250.180.10:443 ogads-pa.googleapis.com udp
US 8.8.8.8:53 241.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 10.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.179.238:443 play.google.com tcp
US 8.8.8.8:53 play.google.com udp
US 8.8.8.8:53 play.google.com udp
GB 142.250.179.238:443 play.google.com udp
US 8.8.8.8:53 238.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 consent.google.com udp
GB 172.217.169.46:443 consent.google.com tcp
US 8.8.8.8:53 consent.google.com udp
US 8.8.8.8:53 consent.google.com udp
GB 172.217.169.46:443 consent.google.com udp
US 8.8.8.8:53 46.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 pylingual.io udp
US 104.21.54.34:443 pylingual.io tcp
US 8.8.8.8:53 pylingual.io udp
US 8.8.8.8:53 pylingual.io udp
US 8.8.8.8:53 34.54.21.104.in-addr.arpa udp
US 104.21.54.34:443 pylingual.io udp
US 8.8.8.8:53 www.youtube.com udp
GB 142.250.178.14:443 www.youtube.com tcp
US 8.8.8.8:53 youtube-ui.l.google.com udp
US 8.8.8.8:53 api.pylingual.io udp
US 8.8.8.8:53 youtube-ui.l.google.com udp
US 104.184.140.42:443 api.pylingual.io tcp
US 8.8.8.8:53 api.pylingual.io udp
US 8.8.8.8:53 api.pylingual.io udp
GB 142.250.178.14:443 youtube-ui.l.google.com udp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 42.140.184.104.in-addr.arpa udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 static.doubleclick.net udp
US 8.8.8.8:53 static.doubleclick.net udp
US 8.8.8.8:53 jnn-pa.googleapis.com udp
GB 142.250.187.194:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
GB 142.250.187.202:443 jnn-pa.googleapis.com tcp
GB 142.250.187.202:443 jnn-pa.googleapis.com tcp
US 8.8.8.8:53 jnn-pa.googleapis.com udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
US 8.8.8.8:53 static.doubleclick.net udp
GB 142.250.187.196:443 www.google.com tcp
US 8.8.8.8:53 i.ytimg.com udp
GB 142.250.187.214:443 i.ytimg.com tcp
US 8.8.8.8:53 jnn-pa.googleapis.com udp
US 8.8.8.8:53 i.ytimg.com udp
GB 142.250.187.194:443 googleads.g.doubleclick.net udp
GB 142.250.187.202:443 jnn-pa.googleapis.com udp
GB 142.250.187.196:443 www.google.com udp
US 8.8.8.8:53 i.ytimg.com udp
GB 142.250.187.214:443 i.ytimg.com udp
GB 142.250.187.230:443 static.doubleclick.net tcp
GB 142.250.179.238:443 youtube-ui.l.google.com tcp
US 8.8.8.8:53 yt3.ggpht.com udp
GB 142.250.179.238:443 youtube-ui.l.google.com udp
GB 142.250.187.230:443 static.doubleclick.net udp
US 8.8.8.8:53 photos-ugc.l.googleusercontent.com udp
GB 142.250.187.225:443 photos-ugc.l.googleusercontent.com tcp
GB 142.250.187.202:443 jnn-pa.googleapis.com udp
US 8.8.8.8:53 photos-ugc.l.googleusercontent.com udp
GB 142.250.187.225:443 photos-ugc.l.googleusercontent.com udp
US 8.8.8.8:53 194.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 214.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 230.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 225.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 cdn.jsdelivr.net udp
US 151.101.129.229:443 cdn.jsdelivr.net tcp
US 8.8.8.8:53 jsdelivr.map.fastly.net udp
US 8.8.8.8:53 jsdelivr.map.fastly.net udp
US 151.101.129.229:443 jsdelivr.map.fastly.net udp
US 8.8.8.8:53 229.129.101.151.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\98d7bb8d-4868-4560-b0ba-7bf3b1984361

MD5 beca82ea63888082f33a95af333e526b
SHA1 24659b0de6a7c4084cbdb3a89ea4480b948da637
SHA256 a9e8beefe748ea6f7001d91c473b07399c4a2dd7f46e392b9e04c5b8e8470785
SHA512 d4939f224cdcb141d4576b60722f58044b434f03b5d6667ea873fd47e3eb7e7dfd0df6619deec10ec7dec85ec8714ef0899a670835f89d18a9c6e73dea5a6c67

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\9b64339f-170f-42a6-8b26-2edacbb58296

MD5 6a55ee10c5b1a1ace1927b33c52a629b
SHA1 29665e2763d51fe3d4687b71c47fbc81c267c8f0
SHA256 e0463177337136097d5653c942c37527a59eb1902affcf6a3715fdccb37a9564
SHA512 c8f93c2e4e6c8d52e1ac54cd617de0e77281ac86473543f4ba0d506b5e20ca61ca92e005232153c6b7230a3af960378f92ff252f13cd2c6bce24e05309c22a47

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\1777812f-bec2-4eaa-bd15-6324566f1e01

MD5 436ce8ae5f9a295e055bf5fc5b0dcab5
SHA1 7b2744f8b6ea9d812eebcc49bd431ce7fdb69cb0
SHA256 91b8bffe8c0ecb94b9a7401821ec395c89d0c7afa1a4aa3b894d99956238695b
SHA512 2228544e816ec7bc521b07a8adec049e457892802b247b0d93d80c3eaa5fb765f22a0d34721a5bfd2b2e5a73b66bf07fc6ebf4c5da662d5334f1ac1ef8e5ef0e

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

MD5 ae9bd574915b3f1e45a4cfab3c1c5f90
SHA1 f15ba8836f3d0c19a2fc4aedae1d89802b27933a
SHA256 e09a21c7cb39a83bceabd51a9f49c1018997c51b01591743992a10721ad30699
SHA512 ecd60160aac218ea65d60fd5e3f07beaeecf7f156bfe234edc1e2d3544b311fc82055a102f22c461452c571add1c9190d447b09639f145f66388aebd35164684

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

MD5 695907ec412c413b0afce9243db7f881
SHA1 84a6bcf2cd76f7221310ac601e5edf1c2a260218
SHA256 631128259399fcd6dc36c49f270ba6a51febb540a9cc5b62b62207e0a4b86b26
SHA512 dc69643241669b52b3ed3c9c8a11d25480c4fc86443263f089ebd6d16838b76b7a55e812d3cc9328ad95c23af8da1daac74db6b9c17ba592b687a3b683449463

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

MD5 d2ff00ec599a029735022ecfe83eb090
SHA1 ba44495993f733489a7b66eb553ec55ca287d672
SHA256 745bfae31b4e988571ea963e9518c780027bd1647339aa3d6c48520149a2de07
SHA512 4f91cafee309af32b396b2ebe9a10d47fff4aff7e0b02cdb6d9e3f9fe16f55c05944a3d4f7e1ef293338d5d181fd8298c2a5195dfda4851ccccfce2231851a39

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

MD5 cc6ac3e520ca761af80eb94e4ac32cf2
SHA1 94e34b660e2467c87edfc8b1d5d230c3888619c1
SHA256 35d73fa43ebdac6fa49de69285286fd25c5b7ac5f1cd7f978ac7cc96464d8353
SHA512 8807c67363fcc63f6a0a829f981fc1dd27c2b8755322e7a5e19fab26a19001fc147d59ce8bbd6ca5e396c41f384d775490222d36643b715030eee17995145e83

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

MD5 0ad1195cd12544b8b2637a0045d7dac9
SHA1 5d057ab88727ac860c443e8977e48d786bf8586d
SHA256 aefce3cf5f1ce640a08a0b9aaa070e2f6cad46418b50d0c1ba3dcbd679e56871
SHA512 0a7b1d35bfae1f8262d60ae02ee24427da51ff3a9097d8340bc8bfb4f865151e73ff02b389c02ee090e9beb2377cced1541cbc03b6259e17bb85cca2a6c09813

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

MD5 02840eef96769fc29fba05c2e412250d
SHA1 a33d29eef1c5320025612f908df1caff884196b3
SHA256 4a9d7387ff4a40a35fdb1a5f5f3f879ca19210c37ea149008a721a0415c7692e
SHA512 1229216448da07d589bff0d668f5b7e95120b877e972b51a97b9bf7843b61424c7fd046c0de7886cf52120804c45dad450853285523c96ca885fa35b1f3aebdb

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

MD5 ad16cac6e8c14838200c002fec046938
SHA1 a4e47d929b6eacd02b0d26246b14adaae6a0141d
SHA256 151183a44fd0afb3795ca3f40d937108ca3a80fa05a86abad3fbcdfd3d1174ac
SHA512 06b77f6196d12760082b59c211d9531ca1353ee666fe200e0d1823959a3d24bfdd8a52f41ea091abe8e9e445460ab1dbdb2a02ce3b1526fcc4257f38da1d90eb

C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

MD5 96c542dec016d9ec1ecc4dddfcbaac66
SHA1 6199f7648bb744efa58acf7b96fee85d938389e4
SHA256 7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512 cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

MD5 e8b9d55de33f074c5f56ec0caaff6efa
SHA1 d3ca66067388c0d974e8d3158c75af9280945f7f
SHA256 7c324f57da70bc167f882859ef6605c7ab2af49680eb1d3ffa6b3e27b2cd20d7
SHA512 d76e4ecdeca6a3260f31bdc2a090cb0be597f18dbbf2ddf6c1b1df022febece72923cdd38e723198986d93643b72e21282e21e48d75fc3bd6c1bf7b5b827d6e3

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

MD5 34b3115435aaa08631a5db660af65f27
SHA1 a2dcba24434eeaaed8fe8b41f18c039294c00568
SHA256 d49a52393a9ba23c1b8f3d9d3a80e8c57b7356265ca77fcb36023f88adcaae31
SHA512 ac4ccc1dfbd325a86dc14765c8dbd37b21a3c416d25a47660ac897beaae982385cb5951e72fb51e15e04e561963b7f686f2fa9a0e841211e13b4ae6edbb4c17e

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

MD5 cea5e3c3996fdeb39bfef35b950aca9b
SHA1 67c77c56328fc392020729d6ce5722c8b8043f6d
SHA256 3b16233134343876fd430c003e5ae4338e0284c0212696f8d1a4f49890322f52
SHA512 9008d425e76b2fa0356eb38fbcddc7efddc32d51146295a4ce2f37df49a239ae1b26e4a795ebd022fe54e6d1066d6980c26ed4629e0203d5a8fce65ff9587377

C:\Users\Admin\AppData\Local\Temp\tmpaddon

MD5 09372174e83dbbf696ee732fd2e875bb
SHA1 ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256 c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512 b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

MD5 2a461e9eb87fd1955cea740a3444ee7a
SHA1 b10755914c713f5a4677494dbe8a686ed458c3c5
SHA256 4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA512 34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

MD5 842039753bf41fa5e11b3a1383061a87
SHA1 3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256 d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512 d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

MD5 7671e3839dbb2013af4d380aa2072653
SHA1 9bdafba10aa7369dd02a17a0443999f2747be78e
SHA256 bb363e5ffba08772a9c608d1269b5e6526e4cb1d6f2d22ff5eb7e20f3a40994c
SHA512 f08154f9c314df3754913f03960130744666943ced6231e3598e2341c18c00926cd7cd445e752cc25774253e0d792a093b537a17319e1030fe9863ebc6a280a6

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

MD5 cb2a07a0dac12566d99ba413a69f80b5
SHA1 c47d88a0684bf04e84b59ca2b27f58ae1ef089fc
SHA256 5d2f1b19a745b0d6ad471e1d8c23b9f9731089d9dfafeac73339c8dde73634a9
SHA512 22fabb36d850a6b68e2fb7ff325f124fc1137958855b754f604986ca658196d7fd3589ca7c73144b2acaa1c68cc4454f0529a6a7069d50bdfd67ba885ca6327f

C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

MD5 0a8747a2ac9ac08ae9508f36c6d75692
SHA1 b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA256 32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA512 59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

MD5 bf957ad58b55f64219ab3f793e374316
SHA1 a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256 bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA512 79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

MD5 daf7ef3acccab478aaa7d6dc1c60f865
SHA1 f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256 bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA512 5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

MD5 cc700a0776037dd4fafed4a8f04f154e
SHA1 d728de31b8cd67a557d0e616c1dba14ca27eb06d
SHA256 630f1e935432a7b39fb083612ee6f0886f46cce3dcf5bae78c7eb98f45660e29
SHA512 4569b60e516a689ac62d568c1539595da45b26f9ed87829e66f2b73cda0f3d26802e93fe1c85246fffcffa8dbfc223fd80dfba55842b57f3800d65b54cbbbef6

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4

MD5 a4693ae2900b04d92c784c776e1290ac
SHA1 60a1b900b194d7814a4cc2c3afe92e755adeb459
SHA256 54f100e25be9cceabc5f87aafb50a08f9ad54f6d33f86054ccc9ab9f68541c5d
SHA512 c99499e5268db671e76674dab70491e59ca3dc5ed81186c6d86d8e32db15298e3da75621c6e77c3899d0f98690aa2702a121c683e2fed2ee227657d0eb80df13

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4

MD5 de5bea18b56e90c273d094889da0a5a8
SHA1 7d4a8ed1471631031c9383f8da2f786611d0207b
SHA256 bc43333444e833e4e41a789bfd96c83b81cc111805a09e50de2ee4f3f29cd542
SHA512 40239fc1f19e98cc0d6e5e9917879e69fc7118cc4d4f0a09c8c02d033372c47c4b02a044c7cb436b8b12ece64cbd25c71860901efca012c06aad6a887109b562

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4

MD5 c1916895064f1d7c0bacba8e1302d78f
SHA1 db3df2c7d9f7a8a0f606fb6a87cfa3722b4d62ef
SHA256 61dc3d8bb6037bc7f72672c016f4128384be543c8c580e10f48a86db73ce44d1
SHA512 0eb836d0a9698d72983ee9f965aa300ab78a99016d13ded53450758d5449048380cab856146ea4d4f45cf6b69034945080468446c7e85ec2d7fdff2b77cdc9d1

C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4

MD5 88fa76a08654cc373a4b16d8d5efc4d3
SHA1 3492390ffb90617d4974d6cb52a27bff830554eb
SHA256 106dfa3263e1d6139c337bc1b818cd4e450d02633574aa9c45243da62bed7a33
SHA512 60e18ff7f4b59389f785af360327d8e966732514b6eba4efde18ce2af6fd9788d888aa2b3edbd95654871019c9cc70139eb8ad5f6bd447b2aa2d2c2a71264ab7

Analysis: behavioral3

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

93s

Max time network

142s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\get_cookies.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 8.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 167.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral4

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

96s

Max time network

145s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\misc.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 180.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 29.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 20.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

N/A

Analysis: behavioral5

Detonation Overview

Submitted

2025-01-07 18:08

Reported

2025-01-07 18:11

Platform

win10v2004-20241007-en

Max time kernel

95s

Max time network

144s

Command Line

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

Signatures

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings C:\Windows\system32\cmd.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Windows\system32\cmd.exe

cmd /c C:\Users\Admin\AppData\Local\Temp\passwords_grabber.pyc

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 8.153.16.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 197.87.175.4.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 166.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 134.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 180.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp

Files

N/A