Analysis
-
max time kernel
66s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
02-07-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
7427b0a0899935dad2b8c2537c927ca8.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
7427b0a0899935dad2b8c2537c927ca8.exe
Resource
win10v2004-20230621-en
General
-
Target
7427b0a0899935dad2b8c2537c927ca8.exe
-
Size
66KB
-
MD5
7427b0a0899935dad2b8c2537c927ca8
-
SHA1
12107e241724be0c980664691d96567e49b75ed0
-
SHA256
a2417b27f08b82ae02c02f8d77484f3bbda0864215e3854318836bdd78470e96
-
SHA512
10502ea49e9121a1b5f96ab490dac60cf524e0170c9bba1fb7f25f0f33ad329d32c15fa51a8d8e45dd979ba0ba45de75de0590f1418a45196beb999a0ed7ccec
-
SSDEEP
768:qHe5kp8x6IXIBsXtql6h2tQHUvlXKY4kpLDwUzc80gmq3oP/oDU:aikp8xHgl6Itjk90r/0O8/ow
Malware Config
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
Modifies extensions of user files 6 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\GetStart.tiff.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Pictures\GetStart.tiff 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\RestoreRename.raw.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\SendOpen.raw.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\SubmitJoin.png.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\UpdateSplit.raw.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Software\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7427b0a0899935dad2b8c2537c927ca8.exe\"" 7427b0a0899935dad2b8c2537c927ca8.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Documents\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" 7427b0a0899935dad2b8c2537c927ca8.exe Set value (str) \REGISTRY\USER\S-1-5-21-3297628651-743815474-1126733160-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\Pictures\\My Wallpaper.jpg" 7427b0a0899935dad2b8c2537c927ca8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1440 7427b0a0899935dad2b8c2537c927ca8.exe 1440 7427b0a0899935dad2b8c2537c927ca8.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 1440 7427b0a0899935dad2b8c2537c927ca8.exe Token: SeIncreaseQuotaPrivilege 776 WMIC.exe Token: SeSecurityPrivilege 776 WMIC.exe Token: SeTakeOwnershipPrivilege 776 WMIC.exe Token: SeLoadDriverPrivilege 776 WMIC.exe Token: SeSystemProfilePrivilege 776 WMIC.exe Token: SeSystemtimePrivilege 776 WMIC.exe Token: SeProfSingleProcessPrivilege 776 WMIC.exe Token: SeIncBasePriorityPrivilege 776 WMIC.exe Token: SeCreatePagefilePrivilege 776 WMIC.exe Token: SeBackupPrivilege 776 WMIC.exe Token: SeRestorePrivilege 776 WMIC.exe Token: SeShutdownPrivilege 776 WMIC.exe Token: SeDebugPrivilege 776 WMIC.exe Token: SeSystemEnvironmentPrivilege 776 WMIC.exe Token: SeRemoteShutdownPrivilege 776 WMIC.exe Token: SeUndockPrivilege 776 WMIC.exe Token: SeManageVolumePrivilege 776 WMIC.exe Token: 33 776 WMIC.exe Token: 34 776 WMIC.exe Token: 35 776 WMIC.exe Token: SeIncreaseQuotaPrivilege 776 WMIC.exe Token: SeSecurityPrivilege 776 WMIC.exe Token: SeTakeOwnershipPrivilege 776 WMIC.exe Token: SeLoadDriverPrivilege 776 WMIC.exe Token: SeSystemProfilePrivilege 776 WMIC.exe Token: SeSystemtimePrivilege 776 WMIC.exe Token: SeProfSingleProcessPrivilege 776 WMIC.exe Token: SeIncBasePriorityPrivilege 776 WMIC.exe Token: SeCreatePagefilePrivilege 776 WMIC.exe Token: SeBackupPrivilege 776 WMIC.exe Token: SeRestorePrivilege 776 WMIC.exe Token: SeShutdownPrivilege 776 WMIC.exe Token: SeDebugPrivilege 776 WMIC.exe Token: SeSystemEnvironmentPrivilege 776 WMIC.exe Token: SeRemoteShutdownPrivilege 776 WMIC.exe Token: SeUndockPrivilege 776 WMIC.exe Token: SeManageVolumePrivilege 776 WMIC.exe Token: 33 776 WMIC.exe Token: 34 776 WMIC.exe Token: 35 776 WMIC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1440 wrote to memory of 1640 1440 7427b0a0899935dad2b8c2537c927ca8.exe 27 PID 1440 wrote to memory of 1640 1440 7427b0a0899935dad2b8c2537c927ca8.exe 27 PID 1440 wrote to memory of 1640 1440 7427b0a0899935dad2b8c2537c927ca8.exe 27 PID 1440 wrote to memory of 1640 1440 7427b0a0899935dad2b8c2537c927ca8.exe 27 PID 1640 wrote to memory of 776 1640 cmd.exe 29 PID 1640 wrote to memory of 776 1640 cmd.exe 29 PID 1640 wrote to memory of 776 1640 cmd.exe 29 PID 1640 wrote to memory of 776 1640 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7427b0a0899935dad2b8c2537c927ca8.exe"C:\Users\Admin\AppData\Local\Temp\7427b0a0899935dad2b8c2537c927ca8.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-