Overview
overview
3Static
static
1Nitro-Gene...in.zip
windows7-x64
3Nitro-Gene...in.zip
windows10-2004-x64
1Nitro-Gene...ICENSE
windows7-x64
1Nitro-Gene...ICENSE
windows10-2004-x64
1Nitro-Gene...g.json
windows7-x64
3Nitro-Gene...g.json
windows10-2004-x64
3Nitro-Gene...es.txt
windows7-x64
1Nitro-Gene...es.txt
windows10-2004-x64
1Nitro-Gene...ain.py
windows7-x64
3Nitro-Gene...ain.py
windows10-2004-x64
3Nitro-Gene...dme.md
windows7-x64
3Nitro-Gene...dme.md
windows10-2004-x64
3Nitro-Gene...ts.txt
windows7-x64
1Nitro-Gene...ts.txt
windows10-2004-x64
1Nitro-Gene...it.txt
windows7-x64
1Nitro-Gene...it.txt
windows10-2004-x64
1Resubmissions
17-11-2024 01:12
241117-bk12esxhnp 317-11-2024 01:12
241117-bkpy6axhmq 317-11-2024 01:09
241117-bhytaaxjhw 3Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-11-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
Nitro-Generator-main.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Nitro-Generator-main.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Nitro-Generator-main/LICENSE
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Nitro-Generator-main/LICENSE
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Nitro-Generator-main/config/config.json
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Nitro-Generator-main/config/config.json
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Nitro-Generator-main/config/proxies.txt
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Nitro-Generator-main/config/proxies.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Nitro-Generator-main/main.py
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Nitro-Generator-main/main.py
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Nitro-Generator-main/readme.md
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Nitro-Generator-main/readme.md
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Nitro-Generator-main/requirements.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Nitro-Generator-main/requirements.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Nitro-Generator-main/results/hit.txt
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Nitro-Generator-main/results/hit.txt
Resource
win10v2004-20241007-en
General
-
Target
Nitro-Generator-main/config/config.json
-
Size
377B
-
MD5
42257f7a3e7f0101c14cc82ccab35375
-
SHA1
f5ac6c5ff6a0132663ed2a775b4a6c500ba61ccc
-
SHA256
fb9a5661d0ce9c1f714da423055c3fdf9d8cffe7a40fd2c46084beb4f8044337
-
SHA512
5784474153bc868d60d84161b882c8fe3330cea2b2c74fe32a6c1017d156d582b97f240d3a793caab94c6fb191dab270247d7f81814c261738915b4ed6e97c8f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2800 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 AcroRd32.exe 2800 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2376 2156 cmd.exe 31 PID 2156 wrote to memory of 2376 2156 cmd.exe 31 PID 2156 wrote to memory of 2376 2156 cmd.exe 31 PID 2376 wrote to memory of 2800 2376 rundll32.exe 32 PID 2376 wrote to memory of 2800 2376 rundll32.exe 32 PID 2376 wrote to memory of 2800 2376 rundll32.exe 32 PID 2376 wrote to memory of 2800 2376 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\config\config.json1⤵
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\config\config.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Nitro-Generator-main\config\config.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52c557acadabcd80ea04274a1721048e0
SHA11ac5a3454563bee845b336db329f30f70860c373
SHA2567e6a8f2bbdc24169cf93915aeed596c740e4e365f2191da713693cd27b559099
SHA5126a499e1414528b184a8183d3a17f1aca0220e6efc2cc4955cc93ed5349ca42d6d07e65b1611c2b0cdab0eb62a8603748d49ea2de1b67b1dbf606d047c587d296