Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Nitro-Gene...in.zip
windows7-x64
1Nitro-Gene...in.zip
windows10-2004-x64
1Nitro-Gene...ICENSE
windows7-x64
1Nitro-Gene...ICENSE
windows10-2004-x64
1Nitro-Gene...g.json
windows7-x64
3Nitro-Gene...g.json
windows10-2004-x64
3Nitro-Gene...es.txt
windows7-x64
1Nitro-Gene...es.txt
windows10-2004-x64
1Nitro-Gene...ain.py
windows7-x64
3Nitro-Gene...ain.py
windows10-2004-x64
3Nitro-Gene...dme.md
windows7-x64
3Nitro-Gene...dme.md
windows10-2004-x64
3Nitro-Gene...ts.txt
windows7-x64
1Nitro-Gene...ts.txt
windows10-2004-x64
1Nitro-Gene...it.txt
windows7-x64
1Nitro-Gene...it.txt
windows10-2004-x64
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/03/2024, 00:25
Static task
static1
Behavioral task
behavioral1
Sample
Nitro-Generator-main.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Nitro-Generator-main.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Nitro-Generator-main/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Nitro-Generator-main/LICENSE
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Nitro-Generator-main/config/config.json
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Nitro-Generator-main/config/config.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Nitro-Generator-main/config/proxies.txt
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Nitro-Generator-main/config/proxies.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
Nitro-Generator-main/main.py
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Nitro-Generator-main/main.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
Nitro-Generator-main/readme.md
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
Nitro-Generator-main/readme.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
Nitro-Generator-main/requirements.txt
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Nitro-Generator-main/requirements.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Nitro-Generator-main/results/hit.txt
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Nitro-Generator-main/results/hit.txt
Resource
win10v2004-20240319-en
General
-
Target
Nitro-Generator-main/config/config.json
-
Size
377B
-
MD5
42257f7a3e7f0101c14cc82ccab35375
-
SHA1
f5ac6c5ff6a0132663ed2a775b4a6c500ba61ccc
-
SHA256
fb9a5661d0ce9c1f714da423055c3fdf9d8cffe7a40fd2c46084beb4f8044337
-
SHA512
5784474153bc868d60d84161b882c8fe3330cea2b2c74fe32a6c1017d156d582b97f240d3a793caab94c6fb191dab270247d7f81814c261738915b4ed6e97c8f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\json_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\json_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2676 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2676 AcroRd32.exe 2676 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1428 1988 cmd.exe 29 PID 1988 wrote to memory of 1428 1988 cmd.exe 29 PID 1988 wrote to memory of 1428 1988 cmd.exe 29 PID 1428 wrote to memory of 2676 1428 rundll32.exe 30 PID 1428 wrote to memory of 2676 1428 rundll32.exe 30 PID 1428 wrote to memory of 2676 1428 rundll32.exe 30 PID 1428 wrote to memory of 2676 1428 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\config\config.json1⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\config\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\config\config.json"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD568c52fe002d48bfe62ae7d059034bc03
SHA1d5bfab39a29c8068e11743ea63067de131f0228a
SHA256595431e5ebeaa48630ed4a923f9080a0443ba7e7d991ecd7dfb4817ae7bd7f6c
SHA51269aba449dbcbec4b4f707f669476466d12d8645877699f3e70029e18ef289a1dead13a7c991080f40d42daae3f013efe641b80a6423fc8f7663d31897b2fe8a1