Resubmissions

02-02-2024 15:39

240202-s3kwlabgeq 10

02-02-2024 08:43

240202-kmlh7aaad9 10

Analysis

  • max time kernel
    249s
  • max time network
    255s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-02-2024 15:39

Errors

Reason
Machine shutdown

General

  • Target

    8910b2027972c981e85da40f9869b5c2.exe

  • Size

    61KB

  • MD5

    8910b2027972c981e85da40f9869b5c2

  • SHA1

    db400e592c40874f66a12b19d8e5a04ec3edf424

  • SHA256

    fa2c56fde9e9006a859c409ed90594d4422bebf9eccc64fd70ac296eea2e47ac

  • SHA512

    9895ce3f1456cd2825a81046ce8d9072e1db2df7d5d5f44ee3452e3de4be60961b1d0150ea1236dd17fd9886638666a0a7550121c940dd3b8285c605e29a0f2a

  • SSDEEP

    768:TKsMqCXfVcWeHM9ZkiANIU/jYLDwUzc80gmq3oP/oDv:TKseKM9ZkiAP0r/0O8/oz

Malware Config

Signatures

  • Nitro

    A ransomware that demands Discord nitro gift codes to decrypt files.

  • Renames multiple (93) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8910b2027972c981e85da40f9869b5c2.exe
    "C:\Users\Admin\AppData\Local\Temp\8910b2027972c981e85da40f9869b5c2.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4240
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 2312
      2⤵
      • Program crash
      PID:2896
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1664
      2⤵
      • Program crash
      PID:4400
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4660
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3920
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k SDRSVC
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1820 -ip 1820
      1⤵
        PID:2336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1820 -ip 1820
        1⤵
          PID:2208
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x4 /state0:0xa3951055 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1732

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1820-115-0x0000000000730000-0x000000000073A000-memory.dmp

          Filesize

          40KB

        • memory/1820-0-0x0000000000260000-0x0000000000276000-memory.dmp

          Filesize

          88KB

        • memory/1820-2-0x0000000005140000-0x00000000056E4000-memory.dmp

          Filesize

          5.6MB

        • memory/1820-3-0x0000000004C70000-0x0000000004D02000-memory.dmp

          Filesize

          584KB

        • memory/1820-4-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

          Filesize

          64KB

        • memory/1820-36-0x00000000751D0000-0x0000000075980000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-43-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

          Filesize

          64KB

        • memory/1820-116-0x00000000751D0000-0x0000000075980000-memory.dmp

          Filesize

          7.7MB

        • memory/1820-1-0x00000000751D0000-0x0000000075980000-memory.dmp

          Filesize

          7.7MB

        • memory/4660-63-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-70-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-72-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-71-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-73-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-74-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-75-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-76-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-64-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB

        • memory/4660-62-0x000001C821D30000-0x000001C821D31000-memory.dmp

          Filesize

          4KB