Analysis

  • max time kernel
    298s
  • max time network
    294s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-11-2022 05:30

General

  • Target

    nitro.exe

  • Size

    197KB

  • MD5

    5c3f73f74ff01937543395e7c97af556

  • SHA1

    81ea3ba54b1100945c15bdabf4d49b25f27ed13d

  • SHA256

    10f30e000c7500ef9ac1116ca3022f03a50700ce39a3f6f76c2b6202bcf14760

  • SHA512

    a857a2e587a6c4dc62d6c3ce43290e1ed62e1a8e46164a77c967bd336693769ccbae22e58c908dfa91a82065b01f19b09b6825424c834e832d3983f384f2541f

  • SSDEEP

    3072:zgcC1rbu+kSthtDvZMMke9Lk7fQLO7VpBNj3c0fTrEC2VFejIYe:zC1rbfkSthtDZanqOZ1THiFwI

Malware Config

Signatures

  • Nitro

    A ransomware that demands Discord nitro gift codes to decrypt files.

  • Modifies extensions of user files 9 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\nitro.exe
    "C:\Users\Admin\AppData\Local\Temp\nitro.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
  • C:\Windows\regedit.exe
    "C:\Windows\regedit.exe"
    1⤵
    • Runs regedit.exe
    • Suspicious behavior: GetForegroundWindowSpam
    PID:4740
  • C:\Users\Admin\AppData\Local\Temp\nitro.exe
    "C:\Users\Admin\AppData\Local\Temp\nitro.exe"
    1⤵
      PID:2440
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3484
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:2224
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Modifies registry class
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      PID:4496
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
      1⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:5084
    • C:\Users\Admin\AppData\Local\Temp\nitro.exe
      "C:\Users\Admin\AppData\Local\Temp\nitro.exe"
      1⤵
        PID:4476
      • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
        "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
        1⤵
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
      • C:\Users\Admin\AppData\Local\Temp\nitro.exe
        "C:\Users\Admin\AppData\Local\Temp\nitro.exe"
        1⤵
        • Adds Run key to start application
        • Sets desktop wallpaper using registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1000
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic csproduct get uuid
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2644

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\NR_decrypt.txt

        Filesize

        52B

        MD5

        340ebdde5b09e607300467ee7c9c1536

        SHA1

        ffe448836006b229a9841872f4ade1cc781f6a3d

        SHA256

        c3702af98a25bd54bb3147033b567214bde12db2c846adaac3571197b52941f1

        SHA512

        f246e3f5dc5c6544be5b4b0e78dd4b1d3e0647995aa0ec641f897bff2d741afee072bfd76d2d0dea21e2e4d08710cdc6f976158586baf266a4a1118cd140f867

      • memory/2828-164-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/2828-166-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/2828-167-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/2828-168-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/2828-169-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/2828-170-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-178-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-172-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-179-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-181-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-177-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-176-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-175-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-174-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-173-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-180-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-183-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-182-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-184-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-185-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-186-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/3576-187-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-137-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-141-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-149-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-150-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-151-0x00000000003A0000-0x00000000003D8000-memory.dmp

        Filesize

        224KB

      • memory/4248-152-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-153-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-154-0x0000000005060000-0x000000000555E000-memory.dmp

        Filesize

        5.0MB

      • memory/4248-155-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-156-0x0000000004C00000-0x0000000004C92000-memory.dmp

        Filesize

        584KB

      • memory/4248-157-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-158-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-159-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-160-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-161-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-162-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-147-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-146-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-165-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-145-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-144-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-143-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-142-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-148-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-140-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-139-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-138-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-119-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-136-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-135-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-134-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-133-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-132-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-131-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-130-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-129-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-128-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-127-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-126-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-125-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-124-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-276-0x0000000000BA0000-0x0000000000BAA000-memory.dmp

        Filesize

        40KB

      • memory/4248-123-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-122-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-121-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB

      • memory/4248-120-0x0000000076E80000-0x000000007700E000-memory.dmp

        Filesize

        1.6MB