Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 14:51

General

  • Target

    Nitro-Generator-discord-nitro/main.py

  • Size

    4KB

  • MD5

    585de85d0c2c07b0e3a6b241896bce14

  • SHA1

    dc86358640345bb6fa24a04f5ee476c9a62dba1a

  • SHA256

    71473c0eeff9ab9b8a4db8a8a8bc463f99be868ede55eb330628e37b4641b25b

  • SHA512

    96218cb54c872235c1a17623d91378c9b45ee83ac82d81b1adae08da91be1ed9ef9b1fbf04a933be25333ca073f6729f4d1109826418746f84f656365bd2297b

  • SSDEEP

    96:lsF1/TnTpxTRoCQfHGCp2i/gmcovRmwBt94CihmhZMYOIm2WiZkyQvqPXM/x:yTnTpxT2CQfJHgPovbTdih0ZnOIm2Wi2

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-discord-nitro\main.py
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-discord-nitro\main.py
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2652
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-discord-nitro\main.py"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    8f1732629a701a37e0b069713c4c6e56

    SHA1

    c2ada324019b431fbdfc883c489367c753104009

    SHA256

    cd1b5c53b26334dd587bdf1b7983cf9f33ce409d4969b5b2b3eecdd13133912f

    SHA512

    bfb73d5cca4a5e7e8657bc084c8832873b9d2e9ca0945ffe2178138f0dd68cd530abc068c9a74bc56c6d0b48124bf789e3497a734536a72fb97d61eb1f9660ba