Analysis

  • max time kernel
    62s
  • max time network
    65s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2023 20:50

General

  • Target

    NitroRansomware.exe

  • Size

    66KB

  • MD5

    fb8b40c35ce47a3e9c7106c3a9074812

  • SHA1

    157158936a9ae7c26f9f2194e0e19cf2729362f3

  • SHA256

    62bf001525c54efc9715f6562e58bce96a6283aed9acb13f330f0fc487220419

  • SHA512

    9bf593e6fbad5c566e6526e7892f750f050cff2e6a255ce611bf51b85e214bba0e1bc2f8d13c6538ac2df16f00a80bebf74f7262ca6b9fd2c1becd211b8d98e6

  • SSDEEP

    768:qH3DdNeB5G8tOHsvVXwmIkpLDwUzc80gmq3oP/oDT:a3RQB3tXWx0r/0O8/oP

Malware Config

Signatures

  • Nitro

    A ransomware that demands Discord nitro gift codes to decrypt files.

  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe
    "C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4620
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 2236
      2⤵
      • Program crash
      PID:1436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 2272
      2⤵
      • Program crash
      PID:4564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4276 -ip 4276
    1⤵
      PID:1184
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get uuid
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4728
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4276 -ip 4276
      1⤵
        PID:2752

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4276-133-0x0000000000720000-0x0000000000736000-memory.dmp

        Filesize

        88KB

      • memory/4276-134-0x0000000005630000-0x0000000005BD4000-memory.dmp

        Filesize

        5.6MB

      • memory/4276-135-0x0000000005120000-0x00000000051B2000-memory.dmp

        Filesize

        584KB

      • memory/4276-136-0x00000000050C0000-0x00000000050D0000-memory.dmp

        Filesize

        64KB

      • memory/4276-149-0x00000000050C0000-0x00000000050D0000-memory.dmp

        Filesize

        64KB

      • memory/4276-212-0x0000000006250000-0x000000000625A000-memory.dmp

        Filesize

        40KB