Resubmissions
14-01-2024 21:31
240114-1c7xfaebc9 10Analysis
-
max time kernel
332s -
max time network
318s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 21:31
Behavioral task
behavioral1
Sample
LEmu Download/NitroGenerator.exe
Resource
win7-20231215-en
General
-
Target
LEmu Download/NitroGenerator.exe
-
Size
14.7MB
-
MD5
5734f0e4d4f3206f635f4956f2f6d8b7
-
SHA1
ed907967147a9fae785084c5a7538ec86667114a
-
SHA256
afefa950275a01596246bc734f8e010c314a713d79c2f20f3a460c59352f9b42
-
SHA512
46126f1427f790907454e745b857721b81392d32bb560ef5e6a6cb3eeb62260072554fa63cad811b45d3b9537e77a2d9553ddf9e5c3628a56b0fe875c15d4b10
-
SSDEEP
393216:qwvpEkZQMidQuslSq99oWOv+9fgriEt8nUdw:qUphQ3dQuSDorvSYriPn/
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2492 NitroGenerator.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe Token: SeShutdownPrivilege 2324 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe 2324 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2492 2132 NitroGenerator.exe 28 PID 2132 wrote to memory of 2492 2132 NitroGenerator.exe 28 PID 2132 wrote to memory of 2492 2132 NitroGenerator.exe 28 PID 2324 wrote to memory of 2308 2324 chrome.exe 34 PID 2324 wrote to memory of 2308 2324 chrome.exe 34 PID 2324 wrote to memory of 2308 2324 chrome.exe 34 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 1096 2324 chrome.exe 36 PID 2324 wrote to memory of 960 2324 chrome.exe 37 PID 2324 wrote to memory of 960 2324 chrome.exe 37 PID 2324 wrote to memory of 960 2324 chrome.exe 37 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38 PID 2324 wrote to memory of 1504 2324 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\LEmu Download\NitroGenerator.exe"C:\Users\Admin\AppData\Local\Temp\LEmu Download\NitroGenerator.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\LEmu Download\NitroGenerator.exe"C:\Users\Admin\AppData\Local\Temp\LEmu Download\NitroGenerator.exe"2⤵
- Loads dropped DLL
PID:2492
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:776
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6719758,0x7fef6719768,0x7fef67197782⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:22⤵PID:1096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:82⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:82⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2264 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:12⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2276 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:12⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1536 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:22⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2836 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:12⤵PID:2672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:82⤵PID:1788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3592 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:82⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3708 --field-trial-handle=1384,i,14396765733562566558,11299338103761167645,131072 /prefetch:82⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
4KB
MD5ea3be76cd381b92f73e32cf47b444318
SHA1e246bdb3e896a8d0ef6a4da939a479c529d6fb66
SHA256d2b5a1521aa0640a268352c8c66ce308a25da46a5e8d7e8068dc76f1102507f9
SHA512388875369444ce82c2727aa3db62567b8ba5029e0ee6d6cd529c8ef81242318c677971d91c9766ae8d33735594552c2d1c97cdd5a792c4088df63f4de4a88282
-
Filesize
4KB
MD52c06bbd754601564989bc9f084a6e62a
SHA15b9fa6441875d89b7c84c8fd56e0c51c61314327
SHA256522690e8431225a27661908aed735855ab4c1b615121bc12b8bd6b90aa36c838
SHA512457273a0c4d132442165d3a313de0d135cb6113e8967902e30ee997293aed51ce886816d4fedf3dd1b02679070a3cd3730c1b02230a19fd6ba245fa558ba4116
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989