Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
11-05-2024 03:11
Static task
static1
Behavioral task
behavioral1
Sample
Discord-Nitro-Generator-and-Checker-main/main.py
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Discord-Nitro-Generator-and-Checker-main/main.py
Resource
win10v2004-20240508-en
General
-
Target
Discord-Nitro-Generator-and-Checker-main/main.py
-
Size
9KB
-
MD5
9e5ae8700307a28c5dce70de7cbac0ca
-
SHA1
6b1d93b55b999d0b26b892c8e04feeaf135a335b
-
SHA256
0cea085efa84ce9984c3309af33bc0d5fb80805234640488b7e0ced2294f46b6
-
SHA512
5e010795ecb62ea5446df604d7af8d940ed6e1746322eaf0744a9b72053936eaa690c50ee5fb35e26560f98283aff124661d51f643cf3d99551325c4c0952709
-
SSDEEP
192:E3RHnPQYk2aPybZNYwxWxf5eJofzreVydW390Rgd6VJEZKZ2cWPay:E3ZPoSWi390aYUL99
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.py rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2260 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2260 AcroRd32.exe 2260 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2780 2440 cmd.exe 29 PID 2440 wrote to memory of 2780 2440 cmd.exe 29 PID 2440 wrote to memory of 2780 2440 cmd.exe 29 PID 2780 wrote to memory of 2260 2780 rundll32.exe 30 PID 2780 wrote to memory of 2260 2780 rundll32.exe 30 PID 2780 wrote to memory of 2260 2780 rundll32.exe 30 PID 2780 wrote to memory of 2260 2780 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Discord-Nitro-Generator-and-Checker-main\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Discord-Nitro-Generator-and-Checker-main\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Discord-Nitro-Generator-and-Checker-main\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5a09d8ec5afe3d12506ed58549410d7dd
SHA1a87a5445e594ca87b71d1b3ad4d6f455a195f0d6
SHA2568edab9e96693f3dc65958ac73c78e348e6df29c7b35120cdea5fc0c2000ec401
SHA5125bd72ddabcf52b719f98e6b37ee2be156049db01d6fe63ac269ace743aee852be207a803b778c46516fe37bf163544558514903b90b2ee3e253cfec7cf96523d