Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 13:02
Behavioral task
behavioral1
Sample
LB3.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
LB3.exe
Resource
win10v2004-20240709-en
General
-
Target
LB3.exe
-
Size
146KB
-
MD5
2357ecbcf3b566c76c839daf7ecf2681
-
SHA1
89d9b7c3eff0a15dc9dbbfe2163de7d5e9479f58
-
SHA256
0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305
-
SHA512
bb5630ae44e684f2dfc74478c57bf97a94045501a64022d563e87f2a60d777307cab2b5a14e6764d25a2fd1f27901624c1ee76ca551d5a5e3a21abc4befef401
-
SSDEEP
3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUS:V6gDBGpvEByocWeauV2gvzwU
Malware Config
Extracted
C:\7V7uPExzv.README.txt
http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/
http://group.goocasino.org
https://nullbulge.com
Signatures
-
Renames multiple (821) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
Processes:
B599.tmppid Process 2448 B599.tmp -
Executes dropped EXE 1 IoCs
Processes:
B599.tmppid Process 2448 B599.tmp -
Loads dropped DLL 1 IoCs
Processes:
LB3.exepid Process 2728 LB3.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
LB3.exedescription ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini LB3.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2212144002-1172735686-1556890956-1000\desktop.ini LB3.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
LB3.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\7V7uPExzv.bmp" LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\7V7uPExzv.bmp" LB3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
LB3.exeB599.tmppid Process 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2448 B599.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
Processes:
LB3.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop LB3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Control Panel\Desktop\WallpaperStyle = "10" LB3.exe -
Modifies registry class 5 IoCs
Processes:
LB3.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\7V7uPExzv LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\7V7uPExzv\DefaultIcon\ = "C:\\ProgramData\\7V7uPExzv.ico" LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.7V7uPExzv LB3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.7V7uPExzv\ = "7V7uPExzv" LB3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\7V7uPExzv\DefaultIcon LB3.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
LB3.exepid Process 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe 2728 LB3.exe -
Suspicious behavior: RenamesItself 26 IoCs
Processes:
B599.tmppid Process 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp 2448 B599.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
LB3.exedescription pid Process Token: SeAssignPrimaryTokenPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeDebugPrivilege 2728 LB3.exe Token: 36 2728 LB3.exe Token: SeImpersonatePrivilege 2728 LB3.exe Token: SeIncBasePriorityPrivilege 2728 LB3.exe Token: SeIncreaseQuotaPrivilege 2728 LB3.exe Token: 33 2728 LB3.exe Token: SeManageVolumePrivilege 2728 LB3.exe Token: SeProfSingleProcessPrivilege 2728 LB3.exe Token: SeRestorePrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSystemProfilePrivilege 2728 LB3.exe Token: SeTakeOwnershipPrivilege 2728 LB3.exe Token: SeShutdownPrivilege 2728 LB3.exe Token: SeDebugPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeBackupPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe Token: SeSecurityPrivilege 2728 LB3.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
LB3.exeB599.tmpdescription pid Process procid_target PID 2728 wrote to memory of 2448 2728 LB3.exe 32 PID 2728 wrote to memory of 2448 2728 LB3.exe 32 PID 2728 wrote to memory of 2448 2728 LB3.exe 32 PID 2728 wrote to memory of 2448 2728 LB3.exe 32 PID 2728 wrote to memory of 2448 2728 LB3.exe 32 PID 2448 wrote to memory of 1884 2448 B599.tmp 33 PID 2448 wrote to memory of 1884 2448 B599.tmp 33 PID 2448 wrote to memory of 1884 2448 B599.tmp 33 PID 2448 wrote to memory of 1884 2448 B599.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\LB3.exe"C:\Users\Admin\AppData\Local\Temp\LB3.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\ProgramData\B599.tmp"C:\ProgramData\B599.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\B599.tmp >> NUL3⤵PID:1884
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1501⤵PID:2304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5c3dd3ef78ae09101e939766a48ad754f
SHA1aad64fa59ad2778fcef0e806cac610b15d1e9be2
SHA25674fc8fde0834f6e1bff0097697f9c1c3f3d422ca8733da1a69086521d8368f49
SHA512e515021bc6ddfdf47e54cb2b68c85389a0502dc99f4134dd706bb4af50f85007b2c84feb6a60a3d5c4cb720078f65cfbadd47c6795d62d3a7490f077dd24bebf
-
Filesize
1KB
MD50d81714d5238e8535ab173285b7a8bda
SHA1870ee5b57d9fa5245978706f81c67867d96cd478
SHA256f97bc5cd317558aa885eff14934e0ad9fafa70dbdec3d96b2844c7dbfd2294aa
SHA512aa9eee6093766e1f3025486086c02c19aaa8cf9b2e470e31747d80753ab002891a944551853a65456334409c9095fe60a13892dc50e4c9d54e8411cddb8c9946
-
Filesize
146KB
MD55614f082881742de4915e702d1c39607
SHA111721266717fe486864cb60f7110f21d714c40e3
SHA2562f182e89fb8d476fb5bc38d7b4bb89e43801ee050e04fdfcd2c5e746e2d3bc44
SHA5120bc752bdaefa496ff1f7c578fc54787f6ef21f52069d7a5e67f8b8aa9d9a330186d51c9686eb8a55b84451ca86c6191ada047e69be88b200d90a363bf06b546a
-
Filesize
129B
MD55ab628074292fc5908cc11cfa61bf101
SHA1a5d2386ea6712236a7f7d195c68d435dd785db94
SHA2569e087fe4720b5e52783d6353550406f0be151d7d0d54bbb0550b81ae3c6aef27
SHA51231e730b905dab5c260127de83b13a0f79de44cfd2de922efffc2573e138f37f338f9b86a783da4c473885d92b23a87cfd99f87412b61510bf16386afd2e0b5cb
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf