Analysis
-
max time kernel
29s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
23-05-2023 19:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DiscordNitroGen.exe
Resource
win7-20230220-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
DiscordNitroGen.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
DiscordNitroGen.exe
-
Size
5.0MB
-
MD5
ac03bc15840de0735bc509df2605315d
-
SHA1
c83e86956dfe720289e05b765b16d6c4bed1b380
-
SHA256
5f7ef589be80bc41e17b2bc2bb9dcfb9f457815298228b313b4186d983a9b206
-
SHA512
8221ddc84711e6fd3f8a6b25178b7222fa60aded1b2f82c0da307bd4160ddbab90f41b85deba7a772df380837c129bb45a059f2aca7ce335094001f68471aef0
-
SSDEEP
3072:tk9F8AiUC7llUdOKViKa6pOWbhpAKyKIVUjtub/cOZzo0xBe0DE:tk9ovTKDhpAKwmEbFZUWD
Score
7/10
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\sysnetwin.exe" DiscordNitroGen.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 524 1236 WerFault.exe 27 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 DiscordNitroGen.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1236 wrote to memory of 524 1236 DiscordNitroGen.exe 30 PID 1236 wrote to memory of 524 1236 DiscordNitroGen.exe 30 PID 1236 wrote to memory of 524 1236 DiscordNitroGen.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordNitroGen.exe"C:\Users\Admin\AppData\Local\Temp\DiscordNitroGen.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1236 -s 12202⤵
- Program crash
PID:524
-