Overview
overview
7Static
static
3Nitro-Gene...up.exe
windows7-x64
7Nitro-Gene...up.exe
windows10-2004-x64
7$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
3$PLUGINSDIR/app-64.7z
windows10-2004-x64
7LICENSE.electron.txt
windows7-x64
1LICENSE.electron.txt
windows10-2004-x64
1chrome_100...nt.pak
windows7-x64
3chrome_100...nt.pak
windows10-2004-x64
3chrome_200...nt.pak
windows7-x64
3chrome_200...nt.pak
windows10-2004-x64
3icudtl.dat
windows7-x64
3icudtl.dat
windows10-2004-x64
3locales/af.pak
windows7-x64
3locales/af.pak
windows10-2004-x64
3locales/am.pak
windows7-x64
3locales/am.pak
windows10-2004-x64
3locales/ar.pak
windows7-x64
3locales/ar.pak
windows10-2004-x64
3locales/bg.pak
windows7-x64
3locales/bg.pak
windows10-2004-x64
3locales/bn.pak
windows7-x64
3locales/bn.pak
windows10-2004-x64
3locales/ca.pak
windows7-x64
3locales/ca.pak
windows10-2004-x64
3Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/02/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
Nitro-Generator-Set.up.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Nitro-Generator-Set.up.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
LICENSE.electron.txt
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
LICENSE.electron.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
chrome_100_percent.pak
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
chrome_100_percent.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral17
Sample
chrome_200_percent.pak
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
chrome_200_percent.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral19
Sample
icudtl.dat
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
icudtl.dat
Resource
win10v2004-20240221-en
Behavioral task
behavioral21
Sample
locales/af.pak
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
locales/af.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral23
Sample
locales/am.pak
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
locales/am.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral25
Sample
locales/ar.pak
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
locales/ar.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral27
Sample
locales/bg.pak
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
locales/bg.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral29
Sample
locales/bn.pak
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
locales/bn.pak
Resource
win10v2004-20240221-en
Behavioral task
behavioral31
Sample
locales/ca.pak
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
locales/ca.pak
Resource
win10v2004-20240221-en
General
-
Target
locales/bn.pak
-
Size
812KB
-
MD5
fac2c752c57175a4b1f4630e3667123e
-
SHA1
a2dbcf1dd7b3cac499b9f782c7393ab438039584
-
SHA256
71f99a67bb310fab8068eeed7ce24ea7624a66051ba4e719d051cc7e67e78001
-
SHA512
4820704bd92dfb60736da5b84c8bc9135fca484c678585ec9d26dcb90632e382f354d03b539599f4816feb027dd285ff06ed8a520bede56d7a1c590d942e4250
-
SSDEEP
3072:3V/m0JEVzjcnmbVrH4kSBbdXWSM5QwXlFE:3w0a5rHEBbd+5tle
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pak_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pak_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pak_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pak_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pak rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.pak\ = "pak_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pak_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\pak_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2560 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2560 AcroRd32.exe 2560 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2704 3016 cmd.exe 29 PID 3016 wrote to memory of 2704 3016 cmd.exe 29 PID 3016 wrote to memory of 2704 3016 cmd.exe 29 PID 2704 wrote to memory of 2560 2704 rundll32.exe 30 PID 2704 wrote to memory of 2560 2704 rundll32.exe 30 PID 2704 wrote to memory of 2560 2704 rundll32.exe 30 PID 2704 wrote to memory of 2560 2704 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\locales\bn.pak1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\locales\bn.pak2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\locales\bn.pak"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5378225b34e438c3753208bcac89284b8
SHA11aaaa7169bd3bf9442f1c83ebb597b66c80fcd02
SHA2568a2214afef7ddde0760388e64f4d1d0de70a7a88a84d5a4d8d0b22f2ea28cd49
SHA512da62830666d87000ea454a335dd1317c33ba6178b6dce5d809763be00cdbbd0520fa921b424d9408084838b0b38231a1c5517c91f3438a087b8e108d0853b92d