Analysis
-
max time kernel
85s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12-08-2021 11:18
Static task
static1
Behavioral task
behavioral1
Sample
23cb7de182b1553bbdd9c4066c7d1f3f.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
23cb7de182b1553bbdd9c4066c7d1f3f.exe
Resource
win10v20210408
General
-
Target
23cb7de182b1553bbdd9c4066c7d1f3f.exe
-
Size
42KB
-
MD5
23cb7de182b1553bbdd9c4066c7d1f3f
-
SHA1
64fbafd3b5f5bba8ac5a664ae5534bf19edf1ed5
-
SHA256
7cca9ea23ca57d8ed6ac3f9a13b193703c04475c274920861edbfea78b4e44aa
-
SHA512
913b2cac23a69f9f2b0bff39b445acfdd38fdeecd29e9838783c1563e23674a515c48da954648f8f89414da8e2734b80397eeb168594295f79b513110955ac67
Malware Config
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
Modifies extensions of user files 16 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.exedescription ioc process File created C:\Users\Admin\Pictures\MoveResolve.raw.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\RevokeInitialize.png.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\RevokeMerge.tif.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\UseLimit.tiff.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\ImportUninstall.tiff.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File opened for modification C:\Users\Admin\Pictures\ImportUninstall.tiff 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\StopBackup.png.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\SubmitUndo.tif.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\ConfirmRestore.tif.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\PopUnregister.tif.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\UnlockEdit.crw.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File opened for modification C:\Users\Admin\Pictures\UseLimit.tiff 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\CompleteSelect.png.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\FormatShow.tif.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\RevokeTest.tif.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe File created C:\Users\Admin\Pictures\UseUndo.png.givemenitro 23cb7de182b1553bbdd9c4066c7d1f3f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\23cb7de182b1553bbdd9c4066c7d1f3f.exe\"" 23cb7de182b1553bbdd9c4066c7d1f3f.exe -
Drops desktop.ini file(s) 5 IoCs
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.exedescription ioc process File opened for modification C:\Users\Admin\Desktop\desktop.ini 23cb7de182b1553bbdd9c4066c7d1f3f.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 23cb7de182b1553bbdd9c4066c7d1f3f.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 23cb7de182b1553bbdd9c4066c7d1f3f.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 23cb7de182b1553bbdd9c4066c7d1f3f.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 23cb7de182b1553bbdd9c4066c7d1f3f.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 7 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" 23cb7de182b1553bbdd9c4066c7d1f3f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.exepid process 580 23cb7de182b1553bbdd9c4066c7d1f3f.exe 580 23cb7de182b1553bbdd9c4066c7d1f3f.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.exeWMIC.exedescription pid process Token: SeDebugPrivilege 580 23cb7de182b1553bbdd9c4066c7d1f3f.exe Token: SeIncreaseQuotaPrivilege 2392 WMIC.exe Token: SeSecurityPrivilege 2392 WMIC.exe Token: SeTakeOwnershipPrivilege 2392 WMIC.exe Token: SeLoadDriverPrivilege 2392 WMIC.exe Token: SeSystemProfilePrivilege 2392 WMIC.exe Token: SeSystemtimePrivilege 2392 WMIC.exe Token: SeProfSingleProcessPrivilege 2392 WMIC.exe Token: SeIncBasePriorityPrivilege 2392 WMIC.exe Token: SeCreatePagefilePrivilege 2392 WMIC.exe Token: SeBackupPrivilege 2392 WMIC.exe Token: SeRestorePrivilege 2392 WMIC.exe Token: SeShutdownPrivilege 2392 WMIC.exe Token: SeDebugPrivilege 2392 WMIC.exe Token: SeSystemEnvironmentPrivilege 2392 WMIC.exe Token: SeRemoteShutdownPrivilege 2392 WMIC.exe Token: SeUndockPrivilege 2392 WMIC.exe Token: SeManageVolumePrivilege 2392 WMIC.exe Token: 33 2392 WMIC.exe Token: 34 2392 WMIC.exe Token: 35 2392 WMIC.exe Token: 36 2392 WMIC.exe Token: SeIncreaseQuotaPrivilege 2392 WMIC.exe Token: SeSecurityPrivilege 2392 WMIC.exe Token: SeTakeOwnershipPrivilege 2392 WMIC.exe Token: SeLoadDriverPrivilege 2392 WMIC.exe Token: SeSystemProfilePrivilege 2392 WMIC.exe Token: SeSystemtimePrivilege 2392 WMIC.exe Token: SeProfSingleProcessPrivilege 2392 WMIC.exe Token: SeIncBasePriorityPrivilege 2392 WMIC.exe Token: SeCreatePagefilePrivilege 2392 WMIC.exe Token: SeBackupPrivilege 2392 WMIC.exe Token: SeRestorePrivilege 2392 WMIC.exe Token: SeShutdownPrivilege 2392 WMIC.exe Token: SeDebugPrivilege 2392 WMIC.exe Token: SeSystemEnvironmentPrivilege 2392 WMIC.exe Token: SeRemoteShutdownPrivilege 2392 WMIC.exe Token: SeUndockPrivilege 2392 WMIC.exe Token: SeManageVolumePrivilege 2392 WMIC.exe Token: 33 2392 WMIC.exe Token: 34 2392 WMIC.exe Token: 35 2392 WMIC.exe Token: 36 2392 WMIC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
23cb7de182b1553bbdd9c4066c7d1f3f.execmd.exedescription pid process target process PID 580 wrote to memory of 1524 580 23cb7de182b1553bbdd9c4066c7d1f3f.exe cmd.exe PID 580 wrote to memory of 1524 580 23cb7de182b1553bbdd9c4066c7d1f3f.exe cmd.exe PID 580 wrote to memory of 1524 580 23cb7de182b1553bbdd9c4066c7d1f3f.exe cmd.exe PID 1524 wrote to memory of 2392 1524 cmd.exe WMIC.exe PID 1524 wrote to memory of 2392 1524 cmd.exe WMIC.exe PID 1524 wrote to memory of 2392 1524 cmd.exe WMIC.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23cb7de182b1553bbdd9c4066c7d1f3f.exe"C:\Users\Admin\AppData\Local\Temp\23cb7de182b1553bbdd9c4066c7d1f3f.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-