Overview
overview
10Static
static
10msedge.exe
windows7-x64
7msedge.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-01-2025 01:32
Behavioral task
behavioral1
Sample
msedge.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
msedge.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
discord_token_grabber.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
discord_token_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
get_cookies.pyc
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
get_cookies.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
misc.pyc
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
misc.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
passwords_grabber.pyc
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
passwords_grabber.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
source_prepared.pyc
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
source_prepared.pyc
Resource
win10v2004-20241007-en
General
-
Target
msedge.exe
-
Size
87.2MB
-
MD5
75d92340f16875e2006cb59683108bd1
-
SHA1
1db3a20e1c530f829a7b36b306e7cc8a38d2f0ca
-
SHA256
336b29d98ff010182352bd37de82dab6e8aa0b05c0b5b63f3d2c2f1e04749be5
-
SHA512
0166db662fd1f2b0255e729de77574f917c069f434b91c9d5d82ab0d36cc5b33a65159bd5ac423813180d08942dfd0f69e99fba214366ca61b2043540a641ac6
-
SSDEEP
1572864:02GKlDWjOsm/OkiqOv8im2AJiE7BbliEoiYgj+h58sMwJVQwOB:0nK5psm/OknOv8i3wVwE65dWw
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2672 msedge.exe -
resource yara_rule behavioral1/files/0x0003000000020b56-1270.dat upx behavioral1/memory/2672-1272-0x000007FEF5A80000-0x000007FEF6068000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1988 wrote to memory of 2672 1988 msedge.exe 30 PID 1988 wrote to memory of 2672 1988 msedge.exe 30 PID 1988 wrote to memory of 2672 1988 msedge.exe 30
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5bb46b85029b543b70276ad8e4c238799
SHA1123bdcd9eebcac1ec0fd2764a37e5e5476bb0c1c
SHA25672c24e1db1ba4df791720a93ca9502d77c3738eebf8b9092a5d82aa8d80121d0
SHA5125e993617509c1cf434938d6a467eb0494e04580ad242535a04937f7c174d429da70a6e71792fc3de69e103ffc5d9de51d29001a4df528cfffefdaa2cef4eaf31