Analysis
-
max time kernel
49s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2023 22:46
Behavioral task
behavioral1
Sample
NitroRansomware.exe
Resource
win10v2004-20230703-en
General
-
Target
NitroRansomware.exe
-
Size
1.7MB
-
MD5
6e4c9fe77dd12b68a62fb669bc33224e
-
SHA1
dc6c3b8e5f286834071b5cc649395d2e5a7cf29d
-
SHA256
9a3e5872a07bf6b187b184764bab6b4e199b3de9c83454632911038d76cb2024
-
SHA512
c32526c1aaa2435d20c08ec34459830ea5788713795e237b396e80e8b6ba435873c338864eb2eda18f33eb9adfe1a7bb4984c0d051b75c69a6518bc3e2aebfb5
-
SSDEEP
49152:zRmYGwfZPnlXgNuTdngwwHv5VbtHw1kqXfd+/9A:zRnDZdQNuNgNhVRw1kqXf0F
Malware Config
Extracted
nitro
https://api.telegram.org/bot6006307805:AAEDDUx2GEUK5B9sfISAl5uogpVR7Py-iFY/sendMessage?chat_id=-1001950887599
-
decrypt_key
e14a1a875002aa43e3b7869ef81c4f675abfcfa3563a2dbd191d0c96a03a7c75/
Signatures
-
Nitro
A ransomware that demands Discord nitro gift codes to decrypt files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomware.exe -
Disables Task Manager via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts NitroRansomware.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\ConvertFromSelect.raw.lmao NitroRansomware.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NR = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\NitroRansomware.exe\"" NitroRansomware.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA NitroRansomware.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomware.exe -
Drops desktop.ini file(s) 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\Pictures\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Documents\desktop.ini NitroRansomware.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini NitroRansomware.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 api.ipify.org 17 api.ipify.org -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3728 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1656 NitroRansomware.exe 1656 NitroRansomware.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 1656 NitroRansomware.exe Token: SeIncreaseQuotaPrivilege 4940 wmic.exe Token: SeSecurityPrivilege 4940 wmic.exe Token: SeTakeOwnershipPrivilege 4940 wmic.exe Token: SeLoadDriverPrivilege 4940 wmic.exe Token: SeSystemProfilePrivilege 4940 wmic.exe Token: SeSystemtimePrivilege 4940 wmic.exe Token: SeProfSingleProcessPrivilege 4940 wmic.exe Token: SeIncBasePriorityPrivilege 4940 wmic.exe Token: SeCreatePagefilePrivilege 4940 wmic.exe Token: SeBackupPrivilege 4940 wmic.exe Token: SeRestorePrivilege 4940 wmic.exe Token: SeShutdownPrivilege 4940 wmic.exe Token: SeDebugPrivilege 4940 wmic.exe Token: SeSystemEnvironmentPrivilege 4940 wmic.exe Token: SeRemoteShutdownPrivilege 4940 wmic.exe Token: SeUndockPrivilege 4940 wmic.exe Token: SeManageVolumePrivilege 4940 wmic.exe Token: 33 4940 wmic.exe Token: 34 4940 wmic.exe Token: 35 4940 wmic.exe Token: 36 4940 wmic.exe Token: SeIncreaseQuotaPrivilege 4940 wmic.exe Token: SeSecurityPrivilege 4940 wmic.exe Token: SeTakeOwnershipPrivilege 4940 wmic.exe Token: SeLoadDriverPrivilege 4940 wmic.exe Token: SeSystemProfilePrivilege 4940 wmic.exe Token: SeSystemtimePrivilege 4940 wmic.exe Token: SeProfSingleProcessPrivilege 4940 wmic.exe Token: SeIncBasePriorityPrivilege 4940 wmic.exe Token: SeCreatePagefilePrivilege 4940 wmic.exe Token: SeBackupPrivilege 4940 wmic.exe Token: SeRestorePrivilege 4940 wmic.exe Token: SeShutdownPrivilege 4940 wmic.exe Token: SeDebugPrivilege 4940 wmic.exe Token: SeSystemEnvironmentPrivilege 4940 wmic.exe Token: SeRemoteShutdownPrivilege 4940 wmic.exe Token: SeUndockPrivilege 4940 wmic.exe Token: SeManageVolumePrivilege 4940 wmic.exe Token: 33 4940 wmic.exe Token: 34 4940 wmic.exe Token: 35 4940 wmic.exe Token: 36 4940 wmic.exe Token: SeDebugPrivilege 3728 tasklist.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1656 wrote to memory of 4940 1656 NitroRansomware.exe 87 PID 1656 wrote to memory of 4940 1656 NitroRansomware.exe 87 PID 1656 wrote to memory of 4940 1656 NitroRansomware.exe 87 PID 1656 wrote to memory of 3728 1656 NitroRansomware.exe 89 PID 1656 wrote to memory of 3728 1656 NitroRansomware.exe 89 PID 1656 wrote to memory of 3728 1656 NitroRansomware.exe 89 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" NitroRansomware.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"C:\Users\Admin\AppData\Local\Temp\NitroRansomware.exe"1⤵
- UAC bypass
- Drops file in Drivers directory
- Modifies extensions of user files
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1656 -
C:\Windows\SysWOW64\Wbem\wmic.exe"wmic" csproduct get uuid2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Windows\SysWOW64\tasklist.exe"tasklist"2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3728
-