Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

02/10/2023, 11:43 UTC

231002-nvrlyshf6t 10

23/05/2023, 19:13 UTC

230523-xw29hsgh32 7

Analysis

  • max time kernel
    29s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    23/05/2023, 19:13 UTC

General

  • Target

    DiscordNitroGen.exe

  • Size

    5.0MB

  • MD5

    ac03bc15840de0735bc509df2605315d

  • SHA1

    c83e86956dfe720289e05b765b16d6c4bed1b380

  • SHA256

    5f7ef589be80bc41e17b2bc2bb9dcfb9f457815298228b313b4186d983a9b206

  • SHA512

    8221ddc84711e6fd3f8a6b25178b7222fa60aded1b2f82c0da307bd4160ddbab90f41b85deba7a772df380837c129bb45a059f2aca7ce335094001f68471aef0

  • SSDEEP

    3072:tk9F8AiUC7llUdOKViKa6pOWbhpAKyKIVUjtub/cOZzo0xBe0DE:tk9ovTKDhpAKwmEbFZUWD

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DiscordNitroGen.exe
    "C:\Users\Admin\AppData\Local\Temp\DiscordNitroGen.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1236 -s 1220
      2⤵
      • Program crash
      PID:524

Network

  • flag-us
    DNS
    ipv4bot.whatismyipaddress.com
    DiscordNitroGen.exe
    Remote address:
    8.8.8.8:53
    Request
    ipv4bot.whatismyipaddress.com
    IN A
    Response
No results found
  • 8.8.8.8:53
    ipv4bot.whatismyipaddress.com
    dns
    DiscordNitroGen.exe
    75 B
    134 B
    1
    1

    DNS Request

    ipv4bot.whatismyipaddress.com

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1236-54-0x0000000000980000-0x00000000009B6000-memory.dmp

    Filesize

    216KB

  • memory/1236-56-0x00000000002E0000-0x00000000002F6000-memory.dmp

    Filesize

    88KB

  • memory/1236-57-0x0000000000370000-0x000000000037C000-memory.dmp

    Filesize

    48KB

  • memory/1236-58-0x000000001ABE0000-0x000000001AC60000-memory.dmp

    Filesize

    512KB

  • memory/1236-59-0x000000001ABE0000-0x000000001AC60000-memory.dmp

    Filesize

    512KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.