Analysis

  • max time kernel
    30s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 21:41

General

  • Target

    Nitro generator.exe

  • Size

    10.5MB

  • MD5

    4ccb716abd3acc0f3cc2374c19f0f010

  • SHA1

    0184196eee7092b23b17a1e6afb0c71d27a3048a

  • SHA256

    6dc83d123dd96acbffae93b622939c5c04813169e5233021974ac707697e6d9d

  • SHA512

    80a697f7b96a569bb1b694e378793fbc188e24808a76f9cb67dda2c4615034dd69d561e97e7841192875a19d914db9706e2ab52ebe0ff0ba58652aff50469b1c

  • SSDEEP

    196608:5GXYC+Y90pCLKioQBALZR3uUhKKMkS0lHJgVbzvpIWp1PlpTHrjxM:IXYCh0AL+QBKHuUhqkS0tCVbzvtH7TXS

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nitro generator.exe
    "C:\Users\Admin\AppData\Local\Temp\Nitro generator.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2248
    • C:\Users\Admin\AppData\Local\Temp\Discord.AIO.exe
      "C:\Users\Admin\AppData\Local\Temp\Discord.AIO.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://aka.ms/dotnet-core-applaunch?missing_runtime=true&arch=x86&rid=win7-x86&apphost_version=6.0.16&gui=true
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1244 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2724
    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    be6f873de47a0a83f6e452de56163edd

    SHA1

    ca3ff760eeb5059218f42e4c5a7267bf33f47560

    SHA256

    6e86d91aec15b2e05cc918a722b4a908bdddce6c7f22ff495e3782e889392ca0

    SHA512

    c9cf6e6438b4cd3e7d913df884a76ca34e4ce1bba492693b60ae041172743686df0864cd59fcfb1e7f9ec5ba9448a0d155bd2999de668cb17b121329d8a4f160

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8a3d4f3da60670a119fb6b93108bb4d7

    SHA1

    7497cd7e0fcad98d584fa76bb860f4d44093f53c

    SHA256

    69d0bc55837d4cf6fbc9e8c7238dbc5a44d3fae6a8da4809f66150761db9b875

    SHA512

    38b0c2772918c62d9fb8fbe8ee2d320e943c638892cfa6abbad875da1b8f6e3bdd97abceb2cf45fcf9716bac21318af7b39eab3ccc6bfd556cc9c3946f9a4985

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    39ccc2649e3973f92ee75b5db1a0d4bf

    SHA1

    1d27578681e066f812bd4b32b3b99fd0e6374cd6

    SHA256

    c6a5f21c7963e9322da82ed23212f89c3d71e7076180ec18c4c9ee4832aceb06

    SHA512

    ff5f6e070a5897a744af59641a56de1b7708210cc79cf91348c4856676b26d7c7b2f8c8dc2cd498cff998f8f802a7faf6fc2feccf340435f3c196f631d762264

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aaafbc4262578a71bcec8ac6a238f714

    SHA1

    6bbf2b14f4fd8c075e1bc342bd6537a8df7728ed

    SHA256

    986a0e384b81c6c5cdc741865c2be6461ad8d36d3a0777762808881980f447f6

    SHA512

    7b75596183e0d3dde04d6d6f077396681a3e7dcd9d52a5ba76ccd0961f7863394552ed1f93a9f64dfc7b00fedbbb024b60f24cdda440a40d92347c26ee206ffd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2211f4aa929b6ff13763743bedb4a492

    SHA1

    3892cc61bc7b72bfdf49caf4b207d0e71038a207

    SHA256

    083ea6c75e2858b500068952002f0159500c8df03e577943222a3eae79c9cd95

    SHA512

    239e3d5f0219dc5233ba65724d16fde7b881d0793fcedcaec55111a51166d7481958b73f4143e664938084bd41d37a1cc68ae6b7572a0c440c7a8282c61d8d94

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    cbb9f1f10d61f9463a5b349ab16b8107

    SHA1

    b4d9d0fa8cbbca29aff2d4decd4de3ef08f897dd

    SHA256

    984c4d09d587c4db8d269a72ce712879854f04d2eb5fdf2afa09c3aa9d9ec05f

    SHA512

    4a435684d9d47359ca5e5d90e9034ba195b42a20e073aa7e7f7372fa6dfd4d08f4f8ea61ed35445f8afb65ae53b7095893ec9e0310a95642f052ef7087124fe2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    8daeaabd47fa52ebf55794853991732a

    SHA1

    cdafe9f436cb9fe20cfa628bdbfded3351d687ca

    SHA256

    f397ff765c54b3b2aeb67a2ad7337937e9f1dfee11505b8fe70ecfacba877b43

    SHA512

    7886dab888f5467881a1c745819d9aef0827c71bb5f83ab0d3fe59afb37d4572eca23cc62f6b45eb5dad0818fda501ef9a6f4929f75db19f305db0f0efd1e686

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    13ab7d8c78b19da21fc784613bd9cab6

    SHA1

    da1208b7a2679bb2ad995365ed395419c72d9a81

    SHA256

    9edd6ab6308197d3797abf50dc2493ecd61234896649230a209c26f061e0672a

    SHA512

    f9b43e117478f6362a110b85011bdf7ff8bda592a75ffc6e09e4ea92ed912e50b8ca91fbfa57698e5c14a6bcc92c7dc2224804cbeacbe45d33bb2ddd3f864ff3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    13ac4370769c52ceb9c3750b1b1971e2

    SHA1

    e03f76239faa37508914256b97823937bb593dd1

    SHA256

    84ec378f706a969b1c199154566a1e7daad609dd243b86c79c0903945687dc74

    SHA512

    69a1e54b7fe8a232e210f16fb893901ca8c402bccd99ee8e418f94fc80939c39b39ed3971f4cab936e3be929207e01739b52974a53650d0d324b4f851d81bc19

  • C:\Users\Admin\AppData\Local\Temp\Cab68D1.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Discord.AIO.exe

    Filesize

    1.2MB

    MD5

    a18dffde4b76922c25b39f0cd7e85800

    SHA1

    599afdc5fbbf923a9e4eff5af44f36b5623c7f88

    SHA256

    b2b4c5cd0d0004bee02d2a96b8dc5bed99e43c0c81b00be41d11990922d693d4

    SHA512

    c7a5827cc85527fa0b05d1e37d8975851df2a75f300db808f231dcc80eeec79b28f978f5231ce991a8b26e75189246e99712b742c1bfb954360c2407370b4823

  • C:\Users\Admin\AppData\Local\Temp\Tar6A1E.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\_MEI23482\python311.dll

    Filesize

    1.1MB

    MD5

    32ebc15f9807a4904a15c707109b0c4c

    SHA1

    f1a039653b3f4055637f214fd33a0f67ca0e0623

    SHA256

    bb4a1a9f7b52a910e6736a4c96b8affbad722aac8bc0860c09989dbca7021ef6

    SHA512

    cc69c50a17f04913425f2459b986db6868aa83213a423f1ce0cc8dc38592dd6895a0341ba7a7d24e6d9720c33717f716ccb6e5256d1ecbf42715ac05ca48d5d9

  • C:\Users\Admin\AppData\Local\Temp\_MEI23482\ucrtbase.dll

    Filesize

    994KB

    MD5

    8e7680a8d07c3c4159241d31caaf369c

    SHA1

    62fe2d4ae788ee3d19e041d81696555a6262f575

    SHA256

    36cc22d92a60e57dee394f56a9d1ed1655ee9db89d2244a959005116a4184d80

    SHA512

    9509f5b07588a08a490f4c3cb859bbfe670052c1c83f92b9c3356afa664cb500364e09f9dafac7d387332cc52d9bb7bb84ceb1493f72d4d17ef08b9ee3cb4174

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    1.2MB

    MD5

    29ffdabfa8d5516e3db6114fee3e8337

    SHA1

    73c3a25a2711964eca1f8c63c006fc93a74a491f

    SHA256

    7ea74c65fa3f81099df899bab94b0dd913577e99c8086934ec3fc58b9168b18d

    SHA512

    a9da822250cc4b909f0804c112ca24a7957f059cd6987750196ee5b8b4eb67c7530592a5333ba27dd691d07ea054a9043c605680983d0539cfc77268610fe79b

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    983KB

    MD5

    199df8d0fdf96757bed61b8082aa7005

    SHA1

    00b6071c84d65be6f3a4650fc0d72c27ec435955

    SHA256

    5bf96827c5a93b82f2fa43e8b71e95d4fe5102c64411b35c99fa6e25e2f453e9

    SHA512

    d184f26e40a8508e98621df743a28420a579c2bd72e83bf7cecd36ea7ffb001bef31c04381574f953be17290b33b057230745629704ab43442ccabe67d209fdb

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    1.0MB

    MD5

    0a592a7c7566d290c5f636fe1f8bb1da

    SHA1

    555c228f4ab25981defab2da630103dd9812824f

    SHA256

    2c3e4680110e2703e204192661e5aea679f70a35a5f5902a8af649bc75f2caf9

    SHA512

    3d37a067c3a304b8f2d7ee4f57996be025d3b021798ea448cf4178826c128d7e57d9440a697304d1dfd8366dfd94ce4db53676629a4840e6177f8fe2686243a6

  • \Users\Admin\AppData\Local\Temp\_MEI23482\api-ms-win-core-file-l1-2-0.dll

    Filesize

    12KB

    MD5

    49e3260ae3f973608f4d4701eb97eb95

    SHA1

    097e7d56c3514a3c7dc17a9c54a8782c6d6c0a27

    SHA256

    476fbad616e20312efc943927ade1a830438a6bebb1dd1f83d2370e5343ea7af

    SHA512

    df22cf16490faa0dc809129ca32eaf1a16ec665f9c5411503ce0153270de038e5d3be1e0e49879a67043a688f6c42bdb5a9a6b3cea43bf533eba087e999be653

  • \Users\Admin\AppData\Local\Temp\_MEI23482\api-ms-win-core-file-l2-1-0.dll

    Filesize

    12KB

    MD5

    7f14fd0436c066a8b40e66386ceb55d0

    SHA1

    288c020fb12a4d8c65ed22a364b5eb8f4126a958

    SHA256

    c78eab8e057bddd55f998e72d8fdf5b53d9e9c8f67c8b404258e198eb2cdcf24

    SHA512

    d04adc52ee0ceed4131eb1d133bfe9a66cbc0f88900270b596116064480afe6ae6ca42feb0eaed54cb141987f2d7716bb2dae947a025014d05d7aa0b0821dc50

  • \Users\Admin\AppData\Local\Temp\_MEI23482\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    15KB

    MD5

    71457fd15de9e0b3ad83b4656cad2870

    SHA1

    c9c2caf4f9e87d32a93a52508561b4595617f09f

    SHA256

    db970725b36cc78ef2e756ff4b42db7b5b771bfd9d106486322cf037115bd911

    SHA512

    a10fcf1d7637effff0ae3e3b4291d54cc7444d985491e82b3f4e559fbb0dbb3b6231a8c689ff240a5036a7acae47421cda58aaa6938374d4b84893cce0077bc8

  • \Users\Admin\AppData\Local\Temp\_MEI23482\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    13KB

    MD5

    e93816c04327730d41224e7a1ba6dc51

    SHA1

    3f83b9fc6291146e58afce5b5447cd6d2f32f749

    SHA256

    ca06ccf12927ca52d8827b3a36b23b6389c4c6d4706345e2d70b895b79ff2ec8

    SHA512

    beaab5a12bfc4498cdf67d8b560ef0b0e2451c5f4634b6c5780a857666fd14f8a379f42e38be1beefa1c3578b2df913d901b271719ac6794bfaab0731bb77bca

  • \Users\Admin\AppData\Local\Temp\_MEI23482\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    13KB

    MD5

    acf40d5e6799231cf7e4026bad0c50a0

    SHA1

    8f0395b7e7d2aac02130f47b23b50d1eab87466b

    SHA256

    64b5b95fe56b6df4c2d47d771bec32bd89267605df736e08c1249b802d6d48d1

    SHA512

    f66a61e89231b6dc95b26d97f5647da42400bc809f70789b9afc00a42b94ea3487913860b69a1b0ee59ed5eb62c3a0cade9e21f95da35fdd42d8ce51c5507632

  • \Users\Admin\AppData\Local\Temp\_MEI23482\python311.dll

    Filesize

    928KB

    MD5

    46bd88bb99a5016de1c0326c5599f1c3

    SHA1

    4223b8ef0ee3745e5fc37f9cf9b9d7260fbc4b3a

    SHA256

    35f64c11ba06d7584ec57bdd542cd666431350295a8de865520abaa7b75ef263

    SHA512

    3ec079be8f74abaad8c4f0a5c1be879236fc15d257cee7eaca53729cf22da640de8601848f04a12836a2200ae97b420b79ad6817d8cdafce93ce7abd7e07a5f6

  • \Users\Admin\AppData\Local\Temp\_MEI23482\ucrtbase.dll

    Filesize

    909KB

    MD5

    a89de645620ff76a56b985ef2de4b2ed

    SHA1

    a9ca699aff02b3b1770529ab6e790155db4f927a

    SHA256

    5a2bab9c9e752dd0008cb2a8d95b69fa82ccf349fd0927a82c26d242513e6adb

    SHA512

    079e088e6ce2f2e884539a84520fcbf988b991f3c7759c1b91a052ca2c048047fdd2111d9851606a30fbe056d7b85250aace24d5b7e6521151987e00de4e4547

  • \Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    745KB

    MD5

    acc9b6c220194ce6fc88d9c6dde0860c

    SHA1

    a32f352982610b1b0e313363dcdcac16d987641f

    SHA256

    f243bd3459dbd7f88461b69f41024c5ec87d2741d4eaf067224216d220350a8a

    SHA512

    231738b92cfafaeeffe8e265afe9dc9773509c5b14ff5d51dd17e83d230af6788af1b12d9143bd6dcd02c7081cd12eb1e949c9a5ad8a2f9aacade724ebcc4e2a

  • \Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    1.0MB

    MD5

    a971dba70a916c18af78a30a70c4dded

    SHA1

    72446cb76f5db4f6c81c51e1eb13d5820e86b09e

    SHA256

    ab7d50facebef82fa588a11a37fa2b8651f7303137e5be9484ca3172320b6ac9

    SHA512

    8d84431210335f8a459cc7117cfb1a52c6d703d0502235573c60f510887eb11228681e09c1db5b20734cd781376caa322bcc74e219098d249a24516b56b06fe6

  • \Users\Admin\AppData\Local\Temp\svchost.exe

    Filesize

    8.1MB

    MD5

    eceb0c6e414de73f3f9a159779e8fc84

    SHA1

    14e4514a7f81e3e094ba94841e3fee0fb7900a2a

    SHA256

    9d56aa3fb51499ad4b2ed4821d456bb6d839cec55905a35ce33dab223da688be

    SHA512

    25389d885dd901ed77c5c970561926bcfcdf346d3854357edbc2e21f62c43955f8a27b0f590e303f78374d856ea129a7801fe286934da6076697191feff33c24

  • memory/2248-54-0x000007FEF53C0000-0x000007FEF5DAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2248-1-0x000007FEF53C0000-0x000007FEF5DAC000-memory.dmp

    Filesize

    9.9MB

  • memory/2248-2-0x000000001B700000-0x000000001B780000-memory.dmp

    Filesize

    512KB

  • memory/2248-0-0x0000000001070000-0x0000000001AFE000-memory.dmp

    Filesize

    10.6MB

  • memory/2512-91-0x000007FEF57C0000-0x000007FEF5DA9000-memory.dmp

    Filesize

    5.9MB