Analysis

  • max time kernel
    91s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 01:29

General

  • Target

    Nitrogen.exe

  • Size

    1.2MB

  • MD5

    834d94cf35d9417aa93a5cb350a756e9

  • SHA1

    5fbe4fef61314da6663b17b9120af20db0a2866f

  • SHA256

    0db5c55ef52e89401a668f59bf4f69391f4632447c51483bb64749d7f2123916

  • SHA512

    d986d4af87088a1599fd2c5eb8bc19594509bd422c1f462788430f6b636c75b9e578889c7322b841d2f0cd77c789c243dc979608f213f9b255a439f11ac70728

  • SSDEEP

    24576:Ye5MhKjQ6Vrn/hdGNGVb9e5DFzvwPxoAgCxp59p:YeEl6Vrn/HQGVb9e5DFzvExVgC

Malware Config

Extracted

Path

C:\Recovery\readme.txt

Ransom Note
Nitrogen welcome you! Take this seriously, this is not a joke! Your company network are encrypted and your data has been stolen and downloaded to our servers. Ignoring this message will result in all your data being published on our blog: http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion This problem can be solved: 1. Your network and data can will be restored. 2. Your data is stolen and stored on our server, after receive payment it will be completely removed from our servers. 3. No one is aware about the data leak from your company except you. If you believe you can handle without us and decrypting your servers and data using some IT Solution from third-party specialists? They will only make significant damage to all of your data; every encrypted file will be corrupted forever. Only our Decryption Tool will make decryption guaranteed. Don't go to recovery companies, they are essentially just middlemen who will make money off you. If you decide not to negotiate with us and find another solution. We will make huge damage to your business by using all of our experience to make your partners, clients, employees and whoever cooperates with your company know about this accident and stop any partnership with you. As a result, You will suffer great losses and you will must to pay a penalty to the state and to compensate for lawsuits against your company. Also in case of disclosure of information about a cyber attack and theft of confidential data of your company your assets may fall and it will cost you several times more expensive instead agreeing with us. Want to go to Government for protection? Your address them for help will only make the situation worse. They will try to prevent you from negotiating with us, because the negotiations will make them look weak and incompetent. After the incident report is handed over to the government department, you receive get a penalty for this accident and leak personal data. This will be a huge amount, you can read more about the GDRP legislation: https://en.wikipedia.org/wiki/General_Data_Protection_Regulation/ In this situation you will not be winners anyway. So lets get straight to the point. After we receive your payment you will get the followings: -Decryption tool for all your systems. -Detailed penetration overview with main kill chain and security recommendations -Proof that we have securely deleted your data -Our word that we will not perform attacks on you in the future. Now, in order to start negotiations, you need to do the following: -Install Tor Browser from https://www.torproject.org/download/ -Use Tor Browser open: xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion/quick-access/5RyUpUB1erpS21m9la/chats/ftornxmnsbgu -If you have any problems accessing the onion site, use the qTox app(https://github.com/qTox/qTox/releases/download/v1.17.6/setup-qtox-x86_64-release.exe) to contact us. ToxID: 088B7708F2C1557B6023B1102FFC5C36C023FF4883CB073F26A33B73832C9268993ED58B817E If you do not contact us within 3 days, we will begin publishing your data on all social networks.
URLs

http://nitrogenczslprh3xyw6lh5xyjvmsz7ciljoqxxknd7uymkfetfhgvqd.onion

http://xqsdbtrtmufdyiqnkrkvosec4gqappf2egcptzqppjtqdevsoadakyqd.onion/quick-access/5RyUpUB1erpS21m9la/chats/ftornxmnsbgu

Signatures

  • Renames multiple (1292) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 25 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Nitrogen.exe
    "C:\Users\Admin\AppData\Local\Temp\Nitrogen.exe"
    1⤵
    • Drops startup file
    • Drops desktop.ini file(s)
    PID:2016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Recovery\readme.txt

    Filesize

    3KB

    MD5

    8ca4b68ab017cf8d1377f62ab7698422

    SHA1

    90b941806b049f0c98c6ca997425564adc31b509

    SHA256

    df25259d4f6e5872cce8292420a4a1ba3358c019c0c6f1c8e42cffaab11b784c

    SHA512

    745a05e913411b8e5067741f597588e6e865b31ddd42a7a0b64fe4339660edc61a809069c74c5698b0958a683ab51ff1f7312c059c6413069e40a864187a09fd

  • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\USStmp.jtx

    Filesize

    3.0MB

    MD5

    9e47c7ee62467455625842b9ccadd49c

    SHA1

    888ef16b7d789a78396d28dcda176e57e685aa03

    SHA256

    4aac743889af063601683262492c1105ed044dbcdf9772c4caa7d911e124c677

    SHA512

    72be83e90a1091387f3b2d6e25712d31fd3d3010339ce1484c09c460261b2287e25ebbe7d7cb6a85fa80cb0dada810c8614cee05f97581a2160996e1ec4f04ac

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension Rules\MANIFEST-000001

    Filesize

    129B

    MD5

    f7833d489c8d622e7b4892c170277ae3

    SHA1

    fbe45b21d88e4d4f7b74be5bea5c754a787822b2

    SHA256

    68f40fea7d0b0dca0916ae2213d2e657a5f95e97d0c653e344069fd4e492ea98

    SHA512

    0de6de4dbaf6c32e7707cfa9772b5df655e2e0b08f62e00ec27a5a31417ffde848440fd1924c16932c4c18649a62bb36e8be98a46a08af44b91d1e79d7973b59

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension Scripts\CURRENT

    Filesize

    104B

    MD5

    87f752851e6ad414551c7c4c3a491894

    SHA1

    904a1b0a324589f86190e736ee25934c47ca2708

    SHA256

    b3e13da34eb199451040240d5a354c6660bafcfe849c3de9d430f205e75244db

    SHA512

    9820f852a1204b891d093fd7269f24bfb80b73bb4d2dde742faf252301ff013ed8333a0e24f937c01c82728008bc6377b67c4ac966f51ef1a3924c5d14394671

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_0

    Filesize

    8KB

    MD5

    0c9eb4f005489bbdb73a04bcb3947eed

    SHA1

    34ca2a46620aa14d2d117074b36670ff175e6d86

    SHA256

    d46a606f84d8c264a2ec24c205b12439afa498d4a00994b66856e80e47369aa1

    SHA512

    ca1f4401589995a62fa1c40070d9513881c5107de1def26494b8f28fc09f4b6f0c5c075783fd5db7f2c8c51b68edc049ba0a8e445f97a4f8d23dea5a2bfc8b80

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_1

    Filesize

    264KB

    MD5

    41b1ed508d47db8615723856f6b95859

    SHA1

    b5b3c20d02c53ba1d6f551442f160b7dc9c51b05

    SHA256

    9be0c88cbd473128af6f654a8ed2cb62cbb488fd0a84e1666fd94139c2f840f0

    SHA512

    208e4156954674c2188de42ccdecb6da057667060c55f56fda079529cfc8cb6694c13188c3ba5d0c2b2420eee1a8238cc53b830aa6ca472d98427eeb66c35ce2

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_2

    Filesize

    8KB

    MD5

    266e8ccbd5c57e60ba38b7b8d8204600

    SHA1

    b761ebeb859416f4cf12308d7bbe5bd6d67ff12e

    SHA256

    28495d2f6c6a9d6ea7fbd1f8dc802f8bd1cdbd535c31fb942910ed7e6325a59d

    SHA512

    9d9fa67bf48b9912f1e00fcddc4fc78bc772828deab22315f8045ea0b8d3e65d6a8aa25e71e9f6112ee4b1ceef0a08155b1e4e0cb32b3b4dfe59ab05357e9dad

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\data_3

    Filesize

    8KB

    MD5

    cde0ac52f781e0697f1d9277522cdcea

    SHA1

    6596f3b1e20e43aded366379d562a8cd93459cf6

    SHA256

    26aaacf21ad71ec1b00d0040d58ddc8a6d7212434168715bf6d2655d2f6ff35e

    SHA512

    4a78ee6792e71adde43a1691e8f0250ebdd67ec4ba333ead3c2815f5554d524c5995ffe65d92843f1b652f751414a99aeaa3994a40cf0304d438ba2e4ef8b3de

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache\index

    Filesize

    256KB

    MD5

    83e3cacb9512bd80bf76268c4589c881

    SHA1

    86f23299a20470275a75e5acd6ab8f347db39d17

    SHA256

    01a611c2cdcd21a58c52a42e47e0bcbdd6bb41781ffc481bebb3c31d80cfd0e1

    SHA512

    5e2326775bfc2a165f867a746cb1be38f2e37236b3594e1a8d42c5a3a6d3298f649547f0fcbc3bde0689c47af1ee200bc2ef63cd64dbff8f95a768212b06aab6

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\3ccc50e6-2756-45ff-8360-e6392c62a4e5\index

    Filesize

    112B

    MD5

    24a6a9b6685eaf00a8b5bd7ae272f3c4

    SHA1

    425d605d3e6819e28e54c61dbf8f91fd07283690

    SHA256

    0c0e5a254cda1170aeb0ed515b98853a87cd271f0d1468c29069ca6b5fce98a3

    SHA512

    d336a004cba71aae4940b5af2700893919002faaef88124fafbf34f05ea676c8e26f42c3875ccfcf1f536ace310964618cded8f750a698851fefe0902605cc2b

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Shared Dictionary\cache\index

    Filesize

    112B

    MD5

    50bacdf82db917db155363421a607c37

    SHA1

    764f47a6b2b9e297e98022dcbc41febc439682cc

    SHA256

    84b8614dacf514b94124b9e57a0facc758bb8bb42309cd96bd55e60db465e051

    SHA512

    0e4e2209e2d2000e46d1c68ff9c754dc23bae8c0ed4abf756c2123a7d8456abcb7ddb253b3b7f7c7bcb307706aa3bee39b1e10be380f32f418e70093de508af7

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\CURRENT

    Filesize

    104B

    MD5

    dbea7053a36d3d14074b00e4c52f5457

    SHA1

    4d3df47e98e6a7919ddbe15ef373e076ba765fab

    SHA256

    e4c2399db72c853a779ed5d8ff63b266dcdadb93a8ee7a03056003d1653dd25f

    SHA512

    35f13be0b4bfbfd96477473abf6f843359e08a8d2fe9205e91c7e4a5a30e0470a20f8a03af783281e92aaf11b827c9508b3660e0fe4625f5620b77eb95b1ff51

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001

    Filesize

    129B

    MD5

    e861d0366d1b641314663b1a7545a24a

    SHA1

    b0ac88a37e193470868cfc85473748ab67e36803

    SHA256

    7c324a8849f3dee094ce82cf813d2e1a6a0dcfe344f6afa6c5cf78d22ca8055d

    SHA512

    98b84d089305663b8199f0f4fddede57a0df393f112e8d4778ce666d6b81cbdce980a2611e318e1c8612acd6dcca9c6825c402860a82cb2e408cc30d7b79c64d

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_1

    Filesize

    264KB

    MD5

    59fe849dbd1b4d186f20000eb88aae34

    SHA1

    033aa27b4de8cc2c8b16a698bea71bb5c608e797

    SHA256

    77e23fc245e48991d695a709c60428399a53c430f0df8bad118ac79c387ac87b

    SHA512

    722db98e533c91e734fe1dcc12492484df5c0d3a73684afc2f87a3d45aacecc4823421af812c30a301389be0b4f297536abae8dd304dff2c87d67a27e901650f

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache\data_2

    Filesize

    8KB

    MD5

    df971c2e497f5f5bd9abd638f54cde94

    SHA1

    13f4f9d131f135fa4f4546c4189f152390f3aafa

    SHA256

    443d66e70a79dcbc4f1dfffb02aeaf439c41163fbe8e8a2fefbeb6241e231126

    SHA512

    27cbfee682347f80f09573acc809d9e04b35bcd3295041ba724f35c1c2df12926f0413473fd378d438732e5904d6dbd2aa796d60420b8f6175c87bb9b89da902

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_0

    Filesize

    8KB

    MD5

    5d3876dd36b6865c91c36bc885c670cc

    SHA1

    f6ee3989c5db7b5cd865a86ad8c07cec15eed7ed

    SHA256

    b557a14f34e5d29741eca00e1f13b94479108091d0f40f26828f69f89804de75

    SHA512

    67217f285735bca6b0ef8e9650f95c6ee74d249f1390cb500585da6e38a729386b682209383ee88fd0672e1f83f2ca36e28b96a436de66f3fd6bfb50d5973cc7

  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\data_3

    Filesize

    8KB

    MD5

    4a64909803c629da2e9535efd42381d4

    SHA1

    f6eb680f50b9c83b0c0f84d3777093c3d32d80ac

    SHA256

    446f0b22f5fa2adb3e7e69839010d0b3f64f2a55ff1e8ccba0bda77c2a5e250b

    SHA512

    cb436be11b3b79fc02bcfe629bba98ae94a18647571d8837e371e538dafa2a8f8ffcb76b79a33785d9a61a5fb1aa61fe4e72cb464032fc715d5e0af63a64658c

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.CredDialogHost_cw5n1h2txyewy\Settings\settings.dat

    Filesize

    8KB

    MD5

    da7922aa9da13d6de00b1f14ac3ea405

    SHA1

    7222ca029ea4e1c3ee9d2e1d6d3c353b2e9355bf

    SHA256

    235cdc85129032a3ed9664942d8b7c385af71f016bd569f86e9c2d0a9ca91e62

    SHA512

    11a53ebacc380f4540381034ef837d5ad4f193c567da1eeb557d8eb4e4e1919f7c5d06bfa47bc123fef22780176fec8183b5975900f304869f526b9d3d582343

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\Settings\settings.dat

    Filesize

    8KB

    MD5

    93d475681dd665a3e1f969f5738c673f

    SHA1

    4671c6209cdbf39c89a0a0379669250f8b14edfe

    SHA256

    239187b3e0ccfba75d53a0d755bcd38db79886275fd0cc44b17c7b18fa5af232

    SHA512

    30b041445eca87a7febc23dbca7d94bc649689ec80ffbbc500f6a108a3ccba4b06e3947a5dba1d2d67900572d8696775dfb8fdb01b17ed9295953ccde2974eee

  • C:\Users\Admin\AppData\Local\Temp\wct97EA.tmp.NBA

    Filesize

    63KB

    MD5

    9fa7fab7aad5cb35ec75648f104f18cf

    SHA1

    d2d76038a0f2164fb31cbc71e0a8b7c258193b7f

    SHA256

    df570c96bec91ff658ef4839bc2bc4a3a9a25a0303c4fba2079e5f4adc01e84f

    SHA512

    328b37ef032b3da6751b161fa6cb31a5fba051195033d9bbe46f539307fcc2884cdd124fdbcdac1a1517bdcdf0f3883cf66121e424acbff215092a3744bb1e66

  • memory/2016-3669-0x00007FF79B030000-0x00007FF79B16C000-memory.dmp

    Filesize

    1.2MB