Resubmissions

17-11-2024 01:12

241117-bk12esxhnp 3

17-11-2024 01:12

241117-bkpy6axhmq 3

17-11-2024 01:09

241117-bhytaaxjhw 3

Analysis

  • max time kernel
    60s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-11-2024 01:09

General

  • Target

    Nitro-Generator-main.zip

  • Size

    16KB

  • MD5

    644f2032041dce1fb10a2cfd7521018a

  • SHA1

    e187565156d3a1874e40c294bcce33e2a5a93daf

  • SHA256

    7e9c81789e1ea9d8f034ebb76c2fb57852c162145220db9bcce2522b6f8c9551

  • SHA512

    30670f6facbb96f6e30325e2d8f0351d0611018302938051e4c9c5a335263f231a0d3d5f014477e00c75d400bf0ebcfb359117ec04128219e364af5b9e825762

  • SSDEEP

    384:KVbCEh/70cpShMoU8bbL92+hVCMF85hW8IcwY25bHWrYOJ:aCER7pNX8nL9XhVCMFEWncwN5bHWrtJ

Score
3/10

Malware Config

Signatures

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 57 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:596
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO452D8E07\requirements.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2088
  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6599758,0x7fef6599768,0x7fef6599778
      2⤵
        PID:2316
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:2
        2⤵
          PID:2508
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1488 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:8
          2⤵
            PID:2780
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1580 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:8
            2⤵
              PID:2496
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1492 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
              2⤵
                PID:2272
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2228 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                2⤵
                  PID:1128
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1112 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:2
                  2⤵
                    PID:1932
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=3184 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                    2⤵
                      PID:856
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3616 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:8
                      2⤵
                        PID:1944
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3736 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                        2⤵
                          PID:1464
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3668 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                          2⤵
                            PID:2068
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3672 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                            2⤵
                              PID:2560
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=1176 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                              2⤵
                                PID:1988
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=2816 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                                2⤵
                                  PID:920
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2688 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:1
                                  2⤵
                                    PID:788
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1704 --field-trial-handle=1216,i,6354197025063826559,14654648287289995731,131072 /prefetch:8
                                    2⤵
                                      PID:2068
                                  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe
                                    "C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"
                                    1⤵
                                      PID:2248

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                      Filesize

                                      215KB

                                      MD5

                                      e579aca9a74ae76669750d8879e16bf3

                                      SHA1

                                      0b8f462b46ec2b2dbaa728bea79d611411bae752

                                      SHA256

                                      6e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf

                                      SHA512

                                      df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000002

                                      Filesize

                                      41KB

                                      MD5

                                      503766d5e5838b4fcadf8c3f72e43605

                                      SHA1

                                      6c8b2fa17150d77929b7dc183d8363f12ff81f59

                                      SHA256

                                      c53b8a39416067f4d70c21be02ca9c84724b1c525d34e7910482b64d8e301cf9

                                      SHA512

                                      5ead599ae1410a5c0e09ee73d0fdf8e8a75864ab6ce12f0777b2938fd54df62993767249f5121af97aa629d8f7c5eae182214b6f67117476e1e2b9a72f34e0b4

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\3cb21e4e0507228f_0

                                      Filesize

                                      19KB

                                      MD5

                                      38077463b1e8e9a1fc9a868e3dfb2021

                                      SHA1

                                      ce983a1285ecab374221118589f70700813baa03

                                      SHA256

                                      ed21ee61fa00e0d2a413d9187f365b4efafbda9a9faddfd73b4100a6cabee1ba

                                      SHA512

                                      46d73466c9b153fe6054927d2bec2a7280f79c5aa8e4f348e0681ae57ce4c6988a6860b0744432f13c8c92c99e78deaf055bdcbde0515bd2e46240697ed09399

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\70c8a68448c9fe6b_0

                                      Filesize

                                      280B

                                      MD5

                                      289f1314922c8aa175717020d98e535f

                                      SHA1

                                      0610b54c552656a8783ce22ac157b871879f1b17

                                      SHA256

                                      e4ca8db4ed0848eb47c8cfb3108ec0dc60736196536a2ba0b464297281bbe61a

                                      SHA512

                                      59b609a73b421ce490d397905b5775c83f5369c1712115e97ae9b1478b5bf4146178464ff207bd9c945a62c2c75f8bff3da980af410170106192e487d0fa0bcf

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      168B

                                      MD5

                                      16906630517f2fc0d0a49ade324bef4e

                                      SHA1

                                      3d69601eeb00004d7250b7434805bd0ed4de61b5

                                      SHA256

                                      144cc900e92cd75b2e5ceb6fb5f2dfc0a1d76952814fac8d625dbbb6f1a2575b

                                      SHA512

                                      6ec5ce86bd239a96f223738ac79d5c6a240112306d10bf9fce27943bc3b033a7a4d6740c4a3d1aecd062d5a5590ffb4e5b328526f593c4cae9635b07beb57f31

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      168B

                                      MD5

                                      9344fb150491171cd6e5f502b580fd0f

                                      SHA1

                                      2574ad0290a44153e52398d1c778cad77dbaa288

                                      SHA256

                                      9fc376649b4bc1409f4d6f7b48cfb773b566f730132c525cb5c207bf81e98634

                                      SHA512

                                      a13059da3bf07da909820f8301473c3f44d7ea5bee4a3cedcd57d41052b3cf6e16c37afee14c1644fcec61485e5767f84f72277d09f42af6f11b9e03e09dac9a

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      168B

                                      MD5

                                      6abb0bf2c4592e4de2473b9fcdb0cad4

                                      SHA1

                                      adaeb1ee597486586f0113414d510f7a2ecd5cb4

                                      SHA256

                                      106b8ff09d40dadd5b545755e677b92f7365b8a49caddabb7643ef8ccf57043f

                                      SHA512

                                      ff3acf28d4847cdb609a13a58f54f1e88ef4d2f39ca181412aeaf43a3e47a902325a4177b0340bda3f0148d219817c7a0fbf8c1226aba16211b4c08ed0f0f0dc

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GCM Store\Encryption\000006.dbtmp

                                      Filesize

                                      16B

                                      MD5

                                      aefd77f47fb84fae5ea194496b44c67a

                                      SHA1

                                      dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                      SHA256

                                      4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                      SHA512

                                      b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      f50f89a0a91564d0b8a211f8921aa7de

                                      SHA1

                                      112403a17dd69d5b9018b8cede023cb3b54eab7d

                                      SHA256

                                      b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                      SHA512

                                      bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                      Filesize

                                      363B

                                      MD5

                                      f1bdc382093ff8bd8b077fc10a13c750

                                      SHA1

                                      002f5ff67b0ca15fd9fd7458331985a8df01a866

                                      SHA256

                                      56dbea6e02bbf13928daf32e8767b960773e2380a848c168d0db665d93f70931

                                      SHA512

                                      43222b82b9edb751639f795b9e246cad6cb73d45a7b39e49eb511331c9ccd897aabd3e72d861822275f1da501015d0ff96fc9020c4b713c52b7a6917c34754c3

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      c7d50adf40fb87a819587294b233bd30

                                      SHA1

                                      a2fc95c9236f225df11308bcf8c68589f1cd0fdb

                                      SHA256

                                      74d383dd292292bfb06c7880440a5b74f77efced683864c75756e09cfc4ebb59

                                      SHA512

                                      aba0803324f1a22325e44fa7148ec3fcf0ed3a911dfae73db3b6f6123f7c0cf9de55f90d4d5e98c80f8cfdfd4ab9517b64673f1e4a981e3163bb0ec57c7d0d22

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      aea190f854d4aa0adf01f7ea383a3669

                                      SHA1

                                      c20bdb17f1ad474f42c20055b369ff2e8eab91cd

                                      SHA256

                                      8f23ccb9251d4de5b99001d8835f5eae8c1a5385aa1831b057ac3d0e209dfe30

                                      SHA512

                                      6724f4effaf7ccd99cb61ec85fecf4e04787604af41d087e093332daa19a2adbfa3fa3fde185f47f3acb1cc3a1017b62d30fc37770a2596237ef2b9b01f42dd7

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp

                                      Filesize

                                      16B

                                      MD5

                                      18e723571b00fb1694a3bad6c78e4054

                                      SHA1

                                      afcc0ef32d46fe59e0483f9a3c891d3034d12f32

                                      SHA256

                                      8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa

                                      SHA512

                                      43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                      Filesize

                                      346KB

                                      MD5

                                      6a1a5d43e089155a5735c9c89951640d

                                      SHA1

                                      d725aaa44140f029811a752194ae805fb4f00ecc

                                      SHA256

                                      74c798abad8674f24d841325762390ab41655a2c34d2dcdd89e9f9837b91552f

                                      SHA512

                                      92f04fbcf8159c9601929c3ab2d56ec540581767a3f1764e6ae9fdd04193c7bf310185a107fe1dd5b3e1560ccbc2b1489d27ecccab19d515bf9eabbe1f28ee83

                                    • C:\Users\Admin\AppData\Local\Temp\7zO452D8E07\requirements.txt

                                      Filesize

                                      18B

                                      MD5

                                      c9ae65f47721f7156a4e08aac85ed85c

                                      SHA1

                                      efe5e708feeceb6875df8593d5ece0086a9924bb

                                      SHA256

                                      83bf247199156685afb6c959da2302c6a9d33a16c420f67b46ffe0985da4cb05

                                      SHA512

                                      d1457193cfa802863325b74d1959eadd6879a0094a9c2395bc1c5fc63e43c408264c1c57afb4307e2fe4d402e4fb5f8540afb028e8e567c143e0abfbc5100f4d

                                    • C:\Users\Admin\AppData\Local\Temp\Cab1557.tmp

                                      Filesize

                                      70KB

                                      MD5

                                      49aebf8cbd62d92ac215b2923fb1b9f5

                                      SHA1

                                      1723be06719828dda65ad804298d0431f6aff976

                                      SHA256

                                      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                      SHA512

                                      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                    • C:\Users\Admin\AppData\Local\Temp\Tar1589.tmp

                                      Filesize

                                      181KB

                                      MD5

                                      4ea6026cf93ec6338144661bf1202cd1

                                      SHA1

                                      a1dec9044f750ad887935a01430bf49322fbdcb7

                                      SHA256

                                      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                      SHA512

                                      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b