Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 17:11

General

  • Target

    Nitro Generator.exe

  • Size

    11KB

  • MD5

    5d8785dc8dea92f99e0d53b149a80b39

  • SHA1

    c02f8269adf0fdbb7189862088e0e2bd7f314ad5

  • SHA256

    5f11bc2a433db184faa4e5a2258c51f275a2d11564e11ef97bb5618d9b0e6a73

  • SHA512

    05bc19a8af9fa3e5322041656b052d00348acdf5acdeea4ba1cf99fcc325dceae67130a1dba3149c66f4d7ee727a744ca18aa1e504c943d8882d80afa25d30d8

  • SSDEEP

    192:sSW+kvgSzGcxq9LWBHz0D63KvyzxZIMUqddZ:4+kYJcxq9Leom38yzxku

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nitro Generator.exe
    "C:\Users\Admin\AppData\Local\Temp\Nitro Generator.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/832-133-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

    Filesize

    40KB

  • memory/832-134-0x00007FFE6BE40000-0x00007FFE6C901000-memory.dmp

    Filesize

    10.8MB

  • memory/832-135-0x000000001BD00000-0x000000001BD10000-memory.dmp

    Filesize

    64KB

  • memory/832-137-0x00007FFE6BE40000-0x00007FFE6C901000-memory.dmp

    Filesize

    10.8MB