Analysis

  • max time kernel
    145s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2024 20:32

General

  • Target

    92eea22c70cf0fe4116b1021e91eb373.exe

  • Size

    61KB

  • MD5

    92eea22c70cf0fe4116b1021e91eb373

  • SHA1

    66b8c24be3b82ecbbebb5e5a70ddf746d212e16f

  • SHA256

    73d55d99c41e89daa8c9bd213d02974d89b53c3e5a0dcd5bbf0b99ff36424cac

  • SHA512

    b8d2b6bba4027bda2ac3ef09c346a1e8ee768afb990bcacbd860bbead42a420303814e4f4081a32b81f89085b53879f7ce888c864cf34654a7c066facb44d035

  • SSDEEP

    768:HKsMqCXfVcWO/M9ZkiANIUM+2YLDwUzc80gmq3oP/oDH:HKseiM9ZkiAPhr/0O8/oj

Malware Config

Signatures

  • Nitro

    A ransomware that demands Discord nitro gift codes to decrypt files.

  • Renames multiple (93) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 5 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92eea22c70cf0fe4116b1021e91eb373.exe
    "C:\Users\Admin\AppData\Local\Temp\92eea22c70cf0fe4116b1021e91eb373.exe"
    1⤵
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic csproduct get uuid
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 2200
      2⤵
      • Program crash
      PID:5344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4644 -s 2200
      2⤵
      • Program crash
      PID:2292
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4644 -ip 4644
    1⤵
      PID:2284
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4644 -ip 4644
      1⤵
        PID:5392

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/4644-0-0x0000000000CA0000-0x0000000000CB6000-memory.dmp

        Filesize

        88KB

      • memory/4644-1-0x00000000751B0000-0x0000000075960000-memory.dmp

        Filesize

        7.7MB

      • memory/4644-2-0x0000000005B80000-0x0000000006124000-memory.dmp

        Filesize

        5.6MB

      • memory/4644-3-0x00000000056B0000-0x0000000005742000-memory.dmp

        Filesize

        584KB

      • memory/4644-4-0x00000000059F0000-0x0000000005A00000-memory.dmp

        Filesize

        64KB

      • memory/4644-75-0x00000000751B0000-0x0000000075960000-memory.dmp

        Filesize

        7.7MB

      • memory/4644-81-0x00000000059F0000-0x0000000005A00000-memory.dmp

        Filesize

        64KB

      • memory/4644-102-0x0000000006420000-0x000000000642A000-memory.dmp

        Filesize

        40KB

      • memory/4644-103-0x00000000751B0000-0x0000000075960000-memory.dmp

        Filesize

        7.7MB