Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/05/2024, 18:01
Static task
static1
Behavioral task
behavioral1
Sample
Discord-Nitro-Generator-and-Checker-main/main.py
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Discord-Nitro-Generator-and-Checker-main/main.py
Resource
win10v2004-20240508-en
General
-
Target
Discord-Nitro-Generator-and-Checker-main/main.py
-
Size
9KB
-
MD5
9e5ae8700307a28c5dce70de7cbac0ca
-
SHA1
6b1d93b55b999d0b26b892c8e04feeaf135a335b
-
SHA256
0cea085efa84ce9984c3309af33bc0d5fb80805234640488b7e0ced2294f46b6
-
SHA512
5e010795ecb62ea5446df604d7af8d940ed6e1746322eaf0744a9b72053936eaa690c50ee5fb35e26560f98283aff124661d51f643cf3d99551325c4c0952709
-
SSDEEP
192:E3RHnPQYk2aPybZNYwxWxf5eJofzreVydW390Rgd6VJEZKZ2cWPay:E3ZPoSWi390aYUL99
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2644 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 AcroRd32.exe 2644 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1532 wrote to memory of 2668 1532 cmd.exe 29 PID 1532 wrote to memory of 2668 1532 cmd.exe 29 PID 1532 wrote to memory of 2668 1532 cmd.exe 29 PID 2668 wrote to memory of 2644 2668 rundll32.exe 30 PID 2668 wrote to memory of 2644 2668 rundll32.exe 30 PID 2668 wrote to memory of 2644 2668 rundll32.exe 30 PID 2668 wrote to memory of 2644 2668 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Discord-Nitro-Generator-and-Checker-main\main.py1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Discord-Nitro-Generator-and-Checker-main\main.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Discord-Nitro-Generator-and-Checker-main\main.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b7a4379cc3a923dfcd052dbfbc1249d6
SHA1f9101ca5961e05025e238b7222f63d700727aa27
SHA2561a2ede28d744ae9466b1b4e34ef398835efc7dbf66cc616c1689f276bc2b1538
SHA512f6e4d4b6c97d65fd20273061901f0fc67e403cc8a0548df5bfbadc792aa268ef773fe80d77fede5996c7d839fe1342507995de25290c82f7c43eac1369aa8912