Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-11-2024 07:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Discord Nitro Generator.exe
Resource
win7-20240903-en
windows7-x64
7 signatures
150 seconds
General
-
Target
Discord Nitro Generator.exe
-
Size
2.0MB
-
MD5
26aade362e76606a6dd64b1783d989eb
-
SHA1
feefb270d825aa93a0c249db479bc3308f7a4b5f
-
SHA256
d235cc33d4a1bad720e4de5e3748ffadc760cfb73326767473e2cb86d1afa3d6
-
SHA512
2fd7b9ad727dce7a689199f0eac2b6eb6873b8a676a531e2732a94c28e3d20dc19b94ad78efa37db7e5a485adbfb1044e65092f97fe57f3ca4d0cd64ae507a14
-
SSDEEP
49152:EQ+UdDEITs0m3KMtun3fDokUdlzWsYNZXPL0yJTEx+F:BLNVTsPG0k49WPNZXTw8
Malware Config
Signatures
-
SectopRAT payload 16 IoCs
resource yara_rule behavioral1/memory/1964-3-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-5-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-8-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-10-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-11-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-12-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-13-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-14-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-15-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-16-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-17-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-18-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-19-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-20-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-21-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat behavioral1/memory/1964-22-0x0000000001280000-0x0000000001B9E000-memory.dmp family_sectoprat -
Sectoprat family
-
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe 1964 Discord Nitro Generator.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Discord Nitro Generator.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 Discord Nitro Generator.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1964 Discord Nitro Generator.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Discord Nitro Generator.exe"C:\Users\Admin\AppData\Local\Temp\Discord Nitro Generator.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1964