Analysis

  • max time kernel
    81s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    02/07/2023, 02:36

General

  • Target

    fb8b40c35ce47a3e9c7106c3a9074812.exe

  • Size

    66KB

  • MD5

    fb8b40c35ce47a3e9c7106c3a9074812

  • SHA1

    157158936a9ae7c26f9f2194e0e19cf2729362f3

  • SHA256

    62bf001525c54efc9715f6562e58bce96a6283aed9acb13f330f0fc487220419

  • SHA512

    9bf593e6fbad5c566e6526e7892f750f050cff2e6a255ce611bf51b85e214bba0e1bc2f8d13c6538ac2df16f00a80bebf74f7262ca6b9fd2c1becd211b8d98e6

  • SSDEEP

    768:qH3DdNeB5G8tOHsvVXwmIkpLDwUzc80gmq3oP/oDT:a3RQB3tXWx0r/0O8/oP

Malware Config

Signatures

  • Nitro

    A ransomware that demands Discord nitro gift codes to decrypt files.

  • Modifies extensions of user files 5 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb8b40c35ce47a3e9c7106c3a9074812.exe
    "C:\Users\Admin\AppData\Local\Temp\fb8b40c35ce47a3e9c7106c3a9074812.exe"
    1⤵
    • Modifies extensions of user files
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      "wmic" csproduct get uuid
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2020

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-54-0x0000000000820000-0x0000000000836000-memory.dmp

    Filesize

    88KB

  • memory/2024-55-0x0000000004C10000-0x0000000004C50000-memory.dmp

    Filesize

    256KB

  • memory/2024-155-0x0000000004C10000-0x0000000004C50000-memory.dmp

    Filesize

    256KB

  • memory/2024-156-0x0000000004C10000-0x0000000004C50000-memory.dmp

    Filesize

    256KB