Analysis
-
max time kernel
81s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2023 01:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20230621-en
windows10-2004-x64
15 signatures
1800 seconds
General
-
Target
NitroRansomware.exe
-
Size
1.3MB
-
MD5
3045686ac229ca8ea1c30217bcc4910e
-
SHA1
0120e0dc05331a99ba6d937439b97e7ee68fcfc3
-
SHA256
2bb0bec19264d1be7d41a921e6312b43a12dbb6e32b21eefcd388b3ad100aaa4
-
SHA512
927f6094353d8bce48f280f4505ceb597c63245bd96459493565196a56212b7e747436cbfd92851116e42101756cb3d313e0b67e38a042b50e84842e4a66b732
-
SSDEEP
24576:YWYGGwodngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+A+q:YWYGjodngwwHv5VbtHw1kqXfd+/9A
Score
10/10
Malware Config
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomware.exe -
Disables Task Manager via registry modification
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\DebugBackup.png.lmao NitroRansomware.exe File created C:\Users\Admin\Pictures\ReceiveSkip.crw.lmao NitroRansomware.exe File created C:\Users\Admin\Pictures\RenameSend.png.lmao NitroRansomware.exe File created C:\Users\Admin\Pictures\ResizeSet.raw.lmao NitroRansomware.exe File created C:\Users\Admin\Pictures\UndoTrace.png.lmao NitroRansomware.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NitroRansomware.exe\"" NitroRansomware.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NitroRansomware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomware.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Documents\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini NitroRansomware.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org 35 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2890635272-812199704-3564780063-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" NitroRansomware.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 5000 4208 WerFault.exe 83 2644 4208 WerFault.exe 83 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2584 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4208 NitroRansomware.exe 4208 NitroRansomware.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 4208 NitroRansomware.exe Token: SeIncreaseQuotaPrivilege 3900 wmic.exe Token: SeSecurityPrivilege 3900 wmic.exe Token: SeTakeOwnershipPrivilege 3900 wmic.exe Token: SeLoadDriverPrivilege 3900 wmic.exe Token: SeSystemProfilePrivilege 3900 wmic.exe Token: SeSystemtimePrivilege 3900 wmic.exe Token: SeProfSingleProcessPrivilege 3900 wmic.exe Token: SeIncBasePriorityPrivilege 3900 wmic.exe Token: SeCreatePagefilePrivilege 3900 wmic.exe Token: SeBackupPrivilege 3900 wmic.exe Token: SeRestorePrivilege 3900 wmic.exe Token: SeShutdownPrivilege 3900 wmic.exe Token: SeDebugPrivilege 3900 wmic.exe Token: SeSystemEnvironmentPrivilege 3900 wmic.exe Token: SeRemoteShutdownPrivilege 3900 wmic.exe Token: SeUndockPrivilege 3900 wmic.exe Token: SeManageVolumePrivilege 3900 wmic.exe Token: 33 3900 wmic.exe Token: 34 3900 wmic.exe Token: 35 3900 wmic.exe Token: 36 3900 wmic.exe Token: SeIncreaseQuotaPrivilege 3900 wmic.exe Token: SeSecurityPrivilege 3900 wmic.exe Token: SeTakeOwnershipPrivilege 3900 wmic.exe Token: SeLoadDriverPrivilege 3900 wmic.exe Token: SeSystemProfilePrivilege 3900 wmic.exe Token: SeSystemtimePrivilege 3900 wmic.exe Token: SeProfSingleProcessPrivilege 3900 wmic.exe Token: SeIncBasePriorityPrivilege 3900 wmic.exe Token: SeCreatePagefilePrivilege 3900 wmic.exe Token: SeBackupPrivilege 3900 wmic.exe Token: SeRestorePrivilege 3900 wmic.exe Token: SeShutdownPrivilege 3900 wmic.exe Token: SeDebugPrivilege 3900 wmic.exe Token: SeSystemEnvironmentPrivilege 3900 wmic.exe Token: SeRemoteShutdownPrivilege 3900 wmic.exe Token: SeUndockPrivilege 3900 wmic.exe Token: SeManageVolumePrivilege 3900 wmic.exe Token: 33 3900 wmic.exe Token: 34 3900 wmic.exe Token: 35 3900 wmic.exe Token: 36 3900 wmic.exe Token: SeDebugPrivilege 2584 tasklist.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4208 wrote to memory of 3900 4208 NitroRansomware.exe 88 PID 4208 wrote to memory of 3900 4208 NitroRansomware.exe 88 PID 4208 wrote to memory of 3900 4208 NitroRansomware.exe 88 PID 4208 wrote to memory of 2584 4208 NitroRansomware.exe 95 PID 4208 wrote to memory of 2584 4208 NitroRansomware.exe 95 PID 4208 wrote to memory of 2584 4208 NitroRansomware.exe 95 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomware.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"1⤵
- UAC bypass
- Modifies extensions of user files
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4208 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 24322⤵
- Program crash
PID:5000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4208 -s 24322⤵
- Program crash
PID:2644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4208 -ip 42081⤵PID:952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4208 -ip 42081⤵PID:3856