Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2023 13:15
Static task
static1
Behavioral task
behavioral1
Sample
NitroRansomwareexe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
NitroRansomwareexe.exe
Resource
win10v2004-20230703-en
General
-
Target
NitroRansomwareexe.exe
-
Size
1.5MB
-
MD5
662b89fc83ffec95d0d1fb911e8b3f8e
-
SHA1
464d3f513e0f05ed342d1d512611fbd17560ba38
-
SHA256
8225c8ed538083338ff8441c73e6a9faa77c6fb8b58a19355fed6edb7e4805d4
-
SHA512
b23a6981f424c2165b031daed2159286786767b51b0b2dc5d31b03282c3b97306ae58b078217aef785a806e7f8dd754e8e36cb7bc5a9af507c9b08bea7a7f266
-
SSDEEP
49152:lpYGwfZPzodngwwHv5VbtHw1kqXfd+/9A:lmDZbIgNhVRw1kqXf0F
Malware Config
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomwareexe.exe -
Disables Task Manager via registry modification
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\EnableClose.raw.lmao NitroRansomwareexe.exe File created C:\Users\Admin\Pictures\RepairStart.crw.lmao NitroRansomwareexe.exe File created C:\Users\Admin\Pictures\RepairUninstall.png.lmao NitroRansomwareexe.exe File created C:\Users\Admin\Pictures\TraceReceive.tif.lmao NitroRansomwareexe.exe File created C:\Users\Admin\Pictures\AddSend.raw.lmao NitroRansomwareexe.exe File created C:\Users\Admin\Pictures\ConvertExit.raw.lmao NitroRansomwareexe.exe File created C:\Users\Admin\Pictures\CopyConnect.tif.lmao NitroRansomwareexe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NitroRansomwareexe.exe\"" NitroRansomwareexe.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NitroRansomwareexe.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomwareexe.exe -
Drops desktop.ini file(s) 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\Desktop\desktop.ini NitroRansomwareexe.exe File opened for modification C:\Users\Admin\Documents\desktop.ini NitroRansomwareexe.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini NitroRansomwareexe.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini NitroRansomwareexe.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini NitroRansomwareexe.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\wallpaper.png" NitroRansomwareexe.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3780 4796 WerFault.exe 84 556 4796 WerFault.exe 84 -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4544 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 NitroRansomwareexe.exe 4796 NitroRansomwareexe.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 4796 NitroRansomwareexe.exe Token: SeIncreaseQuotaPrivilege 2916 wmic.exe Token: SeSecurityPrivilege 2916 wmic.exe Token: SeTakeOwnershipPrivilege 2916 wmic.exe Token: SeLoadDriverPrivilege 2916 wmic.exe Token: SeSystemProfilePrivilege 2916 wmic.exe Token: SeSystemtimePrivilege 2916 wmic.exe Token: SeProfSingleProcessPrivilege 2916 wmic.exe Token: SeIncBasePriorityPrivilege 2916 wmic.exe Token: SeCreatePagefilePrivilege 2916 wmic.exe Token: SeBackupPrivilege 2916 wmic.exe Token: SeRestorePrivilege 2916 wmic.exe Token: SeShutdownPrivilege 2916 wmic.exe Token: SeDebugPrivilege 2916 wmic.exe Token: SeSystemEnvironmentPrivilege 2916 wmic.exe Token: SeRemoteShutdownPrivilege 2916 wmic.exe Token: SeUndockPrivilege 2916 wmic.exe Token: SeManageVolumePrivilege 2916 wmic.exe Token: 33 2916 wmic.exe Token: 34 2916 wmic.exe Token: 35 2916 wmic.exe Token: 36 2916 wmic.exe Token: SeIncreaseQuotaPrivilege 2916 wmic.exe Token: SeSecurityPrivilege 2916 wmic.exe Token: SeTakeOwnershipPrivilege 2916 wmic.exe Token: SeLoadDriverPrivilege 2916 wmic.exe Token: SeSystemProfilePrivilege 2916 wmic.exe Token: SeSystemtimePrivilege 2916 wmic.exe Token: SeProfSingleProcessPrivilege 2916 wmic.exe Token: SeIncBasePriorityPrivilege 2916 wmic.exe Token: SeCreatePagefilePrivilege 2916 wmic.exe Token: SeBackupPrivilege 2916 wmic.exe Token: SeRestorePrivilege 2916 wmic.exe Token: SeShutdownPrivilege 2916 wmic.exe Token: SeDebugPrivilege 2916 wmic.exe Token: SeSystemEnvironmentPrivilege 2916 wmic.exe Token: SeRemoteShutdownPrivilege 2916 wmic.exe Token: SeUndockPrivilege 2916 wmic.exe Token: SeManageVolumePrivilege 2916 wmic.exe Token: 33 2916 wmic.exe Token: 34 2916 wmic.exe Token: 35 2916 wmic.exe Token: 36 2916 wmic.exe Token: SeDebugPrivilege 4544 tasklist.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4796 wrote to memory of 2916 4796 NitroRansomwareexe.exe 87 PID 4796 wrote to memory of 2916 4796 NitroRansomwareexe.exe 87 PID 4796 wrote to memory of 2916 4796 NitroRansomwareexe.exe 87 PID 4796 wrote to memory of 4544 4796 NitroRansomwareexe.exe 89 PID 4796 wrote to memory of 4544 4796 NitroRansomwareexe.exe 89 PID 4796 wrote to memory of 4544 4796 NitroRansomwareexe.exe 89 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomwareexe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NitroRansomwareexe.exe"C:\Users\Admin\AppData\Local\Temp\NitroRansomwareexe.exe"1⤵
- UAC bypass
- Modifies extensions of user files
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4796 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 23282⤵
- Program crash
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4796 -s 23282⤵
- Program crash
PID:556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4796 -ip 47961⤵PID:1820
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4796 -ip 47961⤵PID:3136