Analysis
-
max time kernel
116s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
7427b0a0899935dad2b8c2537c927ca8.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
7427b0a0899935dad2b8c2537c927ca8.exe
Resource
win10v2004-20230621-en
General
-
Target
7427b0a0899935dad2b8c2537c927ca8.exe
-
Size
66KB
-
MD5
7427b0a0899935dad2b8c2537c927ca8
-
SHA1
12107e241724be0c980664691d96567e49b75ed0
-
SHA256
a2417b27f08b82ae02c02f8d77484f3bbda0864215e3854318836bdd78470e96
-
SHA512
10502ea49e9121a1b5f96ab490dac60cf524e0170c9bba1fb7f25f0f33ad329d32c15fa51a8d8e45dd979ba0ba45de75de0590f1418a45196beb999a0ed7ccec
-
SSDEEP
768:qHe5kp8x6IXIBsXtql6h2tQHUvlXKY4kpLDwUzc80gmq3oP/oDU:aikp8xHgl6Itjk90r/0O8/ow
Malware Config
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\SuspendRename.png.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\UnblockGroup.tif.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\UseRegister.tiff.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Pictures\UseRegister.tiff 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\CopyBackup.png.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Pictures\DisconnectUninstall.tiff 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\DismountRestart.crw.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\DisconnectUninstall.tiff.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\EnableGroup.crw.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe File created C:\Users\Admin\Pictures\StartRestart.raw.givemenitro 7427b0a0899935dad2b8c2537c927ca8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\7427b0a0899935dad2b8c2537c927ca8.exe\"" 7427b0a0899935dad2b8c2537c927ca8.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 7427b0a0899935dad2b8c2537c927ca8.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 api.ipify.org 19 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" 7427b0a0899935dad2b8c2537c927ca8.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1268 4304 WerFault.exe 51 4804 4304 WerFault.exe 51 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4304 7427b0a0899935dad2b8c2537c927ca8.exe 4304 7427b0a0899935dad2b8c2537c927ca8.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 4304 7427b0a0899935dad2b8c2537c927ca8.exe Token: SeIncreaseQuotaPrivilege 2248 WMIC.exe Token: SeSecurityPrivilege 2248 WMIC.exe Token: SeTakeOwnershipPrivilege 2248 WMIC.exe Token: SeLoadDriverPrivilege 2248 WMIC.exe Token: SeSystemProfilePrivilege 2248 WMIC.exe Token: SeSystemtimePrivilege 2248 WMIC.exe Token: SeProfSingleProcessPrivilege 2248 WMIC.exe Token: SeIncBasePriorityPrivilege 2248 WMIC.exe Token: SeCreatePagefilePrivilege 2248 WMIC.exe Token: SeBackupPrivilege 2248 WMIC.exe Token: SeRestorePrivilege 2248 WMIC.exe Token: SeShutdownPrivilege 2248 WMIC.exe Token: SeDebugPrivilege 2248 WMIC.exe Token: SeSystemEnvironmentPrivilege 2248 WMIC.exe Token: SeRemoteShutdownPrivilege 2248 WMIC.exe Token: SeUndockPrivilege 2248 WMIC.exe Token: SeManageVolumePrivilege 2248 WMIC.exe Token: 33 2248 WMIC.exe Token: 34 2248 WMIC.exe Token: 35 2248 WMIC.exe Token: 36 2248 WMIC.exe Token: SeIncreaseQuotaPrivilege 2248 WMIC.exe Token: SeSecurityPrivilege 2248 WMIC.exe Token: SeTakeOwnershipPrivilege 2248 WMIC.exe Token: SeLoadDriverPrivilege 2248 WMIC.exe Token: SeSystemProfilePrivilege 2248 WMIC.exe Token: SeSystemtimePrivilege 2248 WMIC.exe Token: SeProfSingleProcessPrivilege 2248 WMIC.exe Token: SeIncBasePriorityPrivilege 2248 WMIC.exe Token: SeCreatePagefilePrivilege 2248 WMIC.exe Token: SeBackupPrivilege 2248 WMIC.exe Token: SeRestorePrivilege 2248 WMIC.exe Token: SeShutdownPrivilege 2248 WMIC.exe Token: SeDebugPrivilege 2248 WMIC.exe Token: SeSystemEnvironmentPrivilege 2248 WMIC.exe Token: SeRemoteShutdownPrivilege 2248 WMIC.exe Token: SeUndockPrivilege 2248 WMIC.exe Token: SeManageVolumePrivilege 2248 WMIC.exe Token: 33 2248 WMIC.exe Token: 34 2248 WMIC.exe Token: 35 2248 WMIC.exe Token: 36 2248 WMIC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1440 4304 7427b0a0899935dad2b8c2537c927ca8.exe 83 PID 4304 wrote to memory of 1440 4304 7427b0a0899935dad2b8c2537c927ca8.exe 83 PID 4304 wrote to memory of 1440 4304 7427b0a0899935dad2b8c2537c927ca8.exe 83 PID 1440 wrote to memory of 2248 1440 cmd.exe 85 PID 1440 wrote to memory of 2248 1440 cmd.exe 85 PID 1440 wrote to memory of 2248 1440 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\7427b0a0899935dad2b8c2537c927ca8.exe"C:\Users\Admin\AppData\Local\Temp\7427b0a0899935dad2b8c2537c927ca8.exe"1⤵
- Modifies extensions of user files
- Adds Run key to start application
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic csproduct get uuid3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 22562⤵
- Program crash
PID:1268
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 22562⤵
- Program crash
PID:4804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4304 -ip 43041⤵PID:2176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4304 -ip 43041⤵PID:3092