Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Nitro-Generator.zip
windows10-2004-x64
1Nitro-Gene...or.exe
windows10-2004-x64
7Nitro-Gene...ld.exe
windows10-2004-x64
3Nitro-Gene...g.json
windows10-2004-x64
3Nitro-Gene...es.txt
windows10-2004-x64
1Nitro-Gene...32.exe
windows10-2004-x64
7main.pyc
windows10-2004-x64
3Nitro-Gene...it.txt
windows10-2004-x64
1Nitro-Gene...64.exe
windows10-2004-x64
3Analysis
-
max time kernel
136s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 20:06
Behavioral task
behavioral1
Sample
Nitro-Generator.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Nitro-Generator/Nitro-Generator.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Nitro-Generator/build.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Nitro-Generator/config/config.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Nitro-Generator/config/proxies.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
Nitro-Generator/lib32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
main.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
Nitro-Generator/results/hit.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Nitro-Generator/vulkan64.exe
Resource
win10v2004-20240802-en
General
-
Target
main.pyc
-
Size
8KB
-
MD5
0b497cc6b1e7f4063c095a40c7b9b474
-
SHA1
3bfb897e69fed5b9d07f1cd8834e73f54905e386
-
SHA256
ca5ec8d67eb30808ed9c77bca78f08319704c4a3fedc64a801bcb3d259b3a986
-
SHA512
a251322eb5f52569637e9e3dcdc79df12d914aca3106fb45149b898755f57522c75cca3a26943b24eb45fd66c81a4cb4c27b50af04a8db44002a941c41b5b38e
-
SSDEEP
192:z9UovClg2utF5I/D64JD1g5YVPJAek0ZKF9wdKayZ2:2g5MD64Tg5YVPJvUg/yY
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4140 OpenWith.exe