Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-10-2023 11:43
Behavioral task
behavioral1
Sample
DiscordNitroGen.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
DiscordNitroGen.exe
Resource
win10v2004-20230915-en
General
-
Target
DiscordNitroGen.exe
-
Size
5.0MB
-
MD5
ac03bc15840de0735bc509df2605315d
-
SHA1
c83e86956dfe720289e05b765b16d6c4bed1b380
-
SHA256
5f7ef589be80bc41e17b2bc2bb9dcfb9f457815298228b313b4186d983a9b206
-
SHA512
8221ddc84711e6fd3f8a6b25178b7222fa60aded1b2f82c0da307bd4160ddbab90f41b85deba7a772df380837c129bb45a059f2aca7ce335094001f68471aef0
-
SSDEEP
3072:tk9F8AiUC7llUdOKViKa6pOWbhpAKyKIVUjtub/cOZzo0xBe0DE:tk9ovTKDhpAKwmEbFZUWD
Malware Config
Extracted
growtopia
-
payload_url
https://cdn.discordapp.com/attachments/741651301993152592/741658256740712458/WebBrowserPassView.exe
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows\CurrentVersion\Run\sysnet = "C:\\Users\\Admin\\AppData\\Local\\sysnetwin.exe" DiscordNitroGen.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2000 DiscordNitroGen.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2756 2000 DiscordNitroGen.exe 30 PID 2000 wrote to memory of 2756 2000 DiscordNitroGen.exe 30 PID 2000 wrote to memory of 2756 2000 DiscordNitroGen.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DiscordNitroGen.exe"C:\Users\Admin\AppData\Local\Temp\DiscordNitroGen.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2000 -s 12042⤵PID:2756
-