Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-11-2022 05:19

General

  • Target

    nitro.zip

  • Size

    160KB

  • MD5

    b81672770e0610b00421c8822ed8b1d2

  • SHA1

    9d4c8a7a309957cd9bbf95a1e750cc60760402cb

  • SHA256

    72198d0c025e9866510cb454e38b5099d345ff627ab04ba3205954142f7decda

  • SHA512

    4ff65c6cf8a2d8bfaef947517eb55f70cb3267f4bf32b5e19cad7bc88a7aaf6bb526e329e28c1605ee7e7ad1c3f7d65a334e3a54ae6270f408c38c27047783f5

  • SSDEEP

    3072:J0O62dUcflC7iHRTEur1hI4HUENiAS/N8x7Y02rzV2P4aD8tnPinAA6:WODYuH2uRhHqAS/Nm75jt/nAA6

Malware Config

Signatures

  • Nitro

    A ransomware that demands Discord nitro gift codes to decrypt files.

  • Modifies extensions of user files 18 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 6 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\nitro.zip
    1⤵
      PID:3188
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 424 -p 1096 -ip 1096
      1⤵
        PID:2252
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1096 -s 2464
        1⤵
        • Program crash
        PID:4360
      • C:\Windows\System32\rundll32.exe
        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
        1⤵
          PID:4140
        • C:\Windows\system32\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\decrypt.txt
          1⤵
          • Opens file in notepad (likely ransom note)
          PID:2520
        • C:\Users\Admin\Desktop\10f30e000c7500ef9ac1116ca3022f03a50700ce39a3f6f76c2b6202bcf14760.exe
          "C:\Users\Admin\Desktop\10f30e000c7500ef9ac1116ca3022f03a50700ce39a3f6f76c2b6202bcf14760.exe"
          1⤵
          • Modifies extensions of user files
          • Adds Run key to start application
          • Drops desktop.ini file(s)
          • Sets desktop wallpaper using registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4136
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:428
            • C:\Windows\SysWOW64\Wbem\WMIC.exe
              wmic csproduct get uuid
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1828

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4136-132-0x0000000000D20000-0x0000000000D58000-memory.dmp

          Filesize

          224KB

        • memory/4136-133-0x0000000005C10000-0x00000000061B4000-memory.dmp

          Filesize

          5.6MB

        • memory/4136-134-0x0000000005700000-0x0000000005792000-memory.dmp

          Filesize

          584KB

        • memory/4136-137-0x00000000012C0000-0x00000000012CA000-memory.dmp

          Filesize

          40KB