Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19-11-2024 16:56
Behavioral task
behavioral1
Sample
nitrogen.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
nitrogen.exe
Resource
win10v2004-20241007-en
General
-
Target
nitrogen.exe
-
Size
5.8MB
-
MD5
6c54a9ec65d3040ba46c5d3f1b3faede
-
SHA1
28fa5ec10f34d29b7eb02664e64f6d8f72120874
-
SHA256
cc16442e6554b7001f4d23d1782dfd5a6836df2c2dc8e409dda921ea3ae8cb93
-
SHA512
3f26c79bd10b4c4ea9279222186e0a731dfd50ddda22530d4092461e05ea1988364b865ee50ff2260c4eb06adf6ef18765e4e56f4d19c62be425bfe653a040e8
-
SSDEEP
98304:IrrwmDSuXXO8RHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nuL:IrrwmDZ7RHvUWvozWOxu9kXwvdbDlA06
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2548 nitrogen.exe -
resource yara_rule behavioral1/files/0x0005000000019bf6-21.dat upx behavioral1/memory/2548-23-0x000007FEF6A30000-0x000007FEF6E9A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2548 1048 nitrogen.exe 29 PID 1048 wrote to memory of 2548 1048 nitrogen.exe 29 PID 1048 wrote to memory of 2548 1048 nitrogen.exe 29
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5b3ae142a88ff3760a852ba7facb901bc
SHA1ad23e5f2f0cc6415086d8c8273c356d35fa4e3ee
SHA2562291ce67c4be953a0b7c56d790b6cc8075ec8166b1b2e05d71f684c59fdd91a5
SHA5123b60b8b7197079d629d01440ed78a589c6a18803cc63cdeac1382dc76201767f18190e694d2c1839a72f6318e39dba6217c48a130903f72e47fa1db504810c1c