Analysis
-
max time kernel
62s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2023 20:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20230621-en
11 signatures
1800 seconds
General
-
Target
NitroRansomware.exe
-
Size
66KB
-
MD5
fb8b40c35ce47a3e9c7106c3a9074812
-
SHA1
157158936a9ae7c26f9f2194e0e19cf2729362f3
-
SHA256
62bf001525c54efc9715f6562e58bce96a6283aed9acb13f330f0fc487220419
-
SHA512
9bf593e6fbad5c566e6526e7892f750f050cff2e6a255ce611bf51b85e214bba0e1bc2f8d13c6538ac2df16f00a80bebf74f7262ca6b9fd2c1becd211b8d98e6
-
SSDEEP
768:qH3DdNeB5G8tOHsvVXwmIkpLDwUzc80gmq3oP/oDT:a3RQB3tXWx0r/0O8/oP
Score
10/10
Malware Config
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\CompressPush.png.givemenitro NitroRansomware.exe File created C:\Users\Admin\Pictures\ResizeLock.crw.givemenitro NitroRansomware.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NitroRansomware.exe\"" NitroRansomware.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Documents\desktop.ini NitroRansomware.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 api.ipify.org 20 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4129409437-3162877118-52503038-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" NitroRansomware.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1436 4276 WerFault.exe 84 4564 4276 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 NitroRansomware.exe 4276 NitroRansomware.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4276 NitroRansomware.exe Token: SeIncreaseQuotaPrivilege 4620 wmic.exe Token: SeSecurityPrivilege 4620 wmic.exe Token: SeTakeOwnershipPrivilege 4620 wmic.exe Token: SeLoadDriverPrivilege 4620 wmic.exe Token: SeSystemProfilePrivilege 4620 wmic.exe Token: SeSystemtimePrivilege 4620 wmic.exe Token: SeProfSingleProcessPrivilege 4620 wmic.exe Token: SeIncBasePriorityPrivilege 4620 wmic.exe Token: SeCreatePagefilePrivilege 4620 wmic.exe Token: SeBackupPrivilege 4620 wmic.exe Token: SeRestorePrivilege 4620 wmic.exe Token: SeShutdownPrivilege 4620 wmic.exe Token: SeDebugPrivilege 4620 wmic.exe Token: SeSystemEnvironmentPrivilege 4620 wmic.exe Token: SeRemoteShutdownPrivilege 4620 wmic.exe Token: SeUndockPrivilege 4620 wmic.exe Token: SeManageVolumePrivilege 4620 wmic.exe Token: 33 4620 wmic.exe Token: 34 4620 wmic.exe Token: 35 4620 wmic.exe Token: 36 4620 wmic.exe Token: SeIncreaseQuotaPrivilege 4620 wmic.exe Token: SeSecurityPrivilege 4620 wmic.exe Token: SeTakeOwnershipPrivilege 4620 wmic.exe Token: SeLoadDriverPrivilege 4620 wmic.exe Token: SeSystemProfilePrivilege 4620 wmic.exe Token: SeSystemtimePrivilege 4620 wmic.exe Token: SeProfSingleProcessPrivilege 4620 wmic.exe Token: SeIncBasePriorityPrivilege 4620 wmic.exe Token: SeCreatePagefilePrivilege 4620 wmic.exe Token: SeBackupPrivilege 4620 wmic.exe Token: SeRestorePrivilege 4620 wmic.exe Token: SeShutdownPrivilege 4620 wmic.exe Token: SeDebugPrivilege 4620 wmic.exe Token: SeSystemEnvironmentPrivilege 4620 wmic.exe Token: SeRemoteShutdownPrivilege 4620 wmic.exe Token: SeUndockPrivilege 4620 wmic.exe Token: SeManageVolumePrivilege 4620 wmic.exe Token: 33 4620 wmic.exe Token: 34 4620 wmic.exe Token: 35 4620 wmic.exe Token: 36 4620 wmic.exe Token: SeIncreaseQuotaPrivilege 4728 WMIC.exe Token: SeSecurityPrivilege 4728 WMIC.exe Token: SeTakeOwnershipPrivilege 4728 WMIC.exe Token: SeLoadDriverPrivilege 4728 WMIC.exe Token: SeSystemProfilePrivilege 4728 WMIC.exe Token: SeSystemtimePrivilege 4728 WMIC.exe Token: SeProfSingleProcessPrivilege 4728 WMIC.exe Token: SeIncBasePriorityPrivilege 4728 WMIC.exe Token: SeCreatePagefilePrivilege 4728 WMIC.exe Token: SeBackupPrivilege 4728 WMIC.exe Token: SeRestorePrivilege 4728 WMIC.exe Token: SeShutdownPrivilege 4728 WMIC.exe Token: SeDebugPrivilege 4728 WMIC.exe Token: SeSystemEnvironmentPrivilege 4728 WMIC.exe Token: SeRemoteShutdownPrivilege 4728 WMIC.exe Token: SeUndockPrivilege 4728 WMIC.exe Token: SeManageVolumePrivilege 4728 WMIC.exe Token: 33 4728 WMIC.exe Token: 34 4728 WMIC.exe Token: 35 4728 WMIC.exe Token: 36 4728 WMIC.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4620 4276 NitroRansomware.exe 85 PID 4276 wrote to memory of 4620 4276 NitroRansomware.exe 85 PID 4276 wrote to memory of 4620 4276 NitroRansomware.exe 85 PID 3840 wrote to memory of 4728 3840 cmd.exe 107 PID 3840 wrote to memory of 4728 3840 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 22362⤵
- Program crash
PID:1436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 22722⤵
- Program crash
PID:4564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4276 -ip 42761⤵PID:1184
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4276 -ip 42761⤵PID:2752