Analysis

  • max time kernel
    46s
  • max time network
    51s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20-05-2021 05:40

General

  • Target

    Free Discord Nitro.exe

  • Size

    662KB

  • MD5

    98d08b7942589fe9e468a91f048dcd3d

  • SHA1

    af2950a505dd6e594f6f22305b939d5befafbe6f

  • SHA256

    2d18c676d4c1bbfa2939d36e88d95ece52af4220f0579a15d68642906a42f3c2

  • SHA512

    6672b5b900412a167d1d4e2bfaf4a2d901ed800cdb65f25645d498178839529dfb0de51610e59fb1de867a76fa8a82cdeb11ed4bfc55a4eefd356b510d62f4c5

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 3 IoCs
  • Drops startup file 2 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Free Discord Nitro.exe
    "C:\Users\Admin\AppData\Local\Temp\Free Discord Nitro.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:424
    • C:\Users\Admin\AppData\Local\Temp\Free Discord Nitro.exe
      "C:\Users\Admin\AppData\Local\Temp\Free Discord Nitro.exe"
      2⤵
        PID:2416
      • C:\Users\Admin\AppData\Local\Temp\Free Discord Nitro.exe
        "C:\Users\Admin\AppData\Local\Temp\Free Discord Nitro.exe"
        2⤵
        • Drops startup file
        • Suspicious behavior: EnumeratesProcesses
        PID:2340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1116
          3⤵
          • Suspicious use of NtCreateProcessExOtherParentProcess
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2648
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -nohome
      1⤵
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:82945 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3924
    • C:\Windows\SysWOW64\werfault.exe
      werfault.exe /h /shared Global\34bde6cbdc2348db954c4db977d3e8a5 /t 3868 /p 3924
      1⤵
        PID:1232

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/424-114-0x0000000000030000-0x0000000000031000-memory.dmp

        Filesize

        4KB

      • memory/424-116-0x0000000004DE0000-0x0000000004DE1000-memory.dmp

        Filesize

        4KB

      • memory/424-117-0x0000000004980000-0x0000000004981000-memory.dmp

        Filesize

        4KB

      • memory/424-118-0x00000000048E0000-0x0000000004DDE000-memory.dmp

        Filesize

        5.0MB

      • memory/424-119-0x0000000004900000-0x0000000004901000-memory.dmp

        Filesize

        4KB

      • memory/424-120-0x0000000004B40000-0x0000000004B4A000-memory.dmp

        Filesize

        40KB

      • memory/1640-124-0x00007FF8936B0000-0x00007FF89371B000-memory.dmp

        Filesize

        428KB

      • memory/2340-121-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2340-123-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/3924-126-0x000000006A560000-0x000000006BD16000-memory.dmp

        Filesize

        23.7MB