Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-07-2024 13:25

General

  • Target

    1.exe

  • Size

    146KB

  • MD5

    314275168bf7958219662a242dbfe8a7

  • SHA1

    d629032d9d8f491d133ee26a230c393335d7ad74

  • SHA256

    f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23

  • SHA512

    b5246db461ee78d622a33a758b3d178208b88e0b9e98185f17ee95f2fbbcf66b1059afece1dd5b586d01587bc01662491a6baab208b9836d4b4b9efc55f14c2f

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUSx:V6gDBGpvEByocWeauV2gvzwUA

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3CD9D493F1828E1A87 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (792) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2072
    • C:\ProgramData\DDF0.tmp
      "C:\ProgramData\DDF0.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\DDF0.tmp >> NUL
        3⤵
          PID:684
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x154
      1⤵
        PID:1732

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-2212144002-1172735686-1556890956-1000\AAAAAAAAAAA

        Filesize

        129B

        MD5

        7e84c732b764e55a66f9c39e7546389d

        SHA1

        4932d5c10d9332bfb19c263f742aa594a1f8c805

        SHA256

        1c1a3089e40978e50daf5fd1b3742ef68f7b2909847fb54f81a1ca10b4c41d09

        SHA512

        6c3fbf587175886a887b4f37afa8e6526b9792d78b24f461bce573f85bf76e188e39d79c92e1008aeb056dee6f3a2e2d256c58a9897dda62b03e1b085721ad5d

      • C:\7V7uPExzv.README.txt

        Filesize

        1KB

        MD5

        8c2be5dabda6d70998031e98877de66e

        SHA1

        476e830160f2b4baead3e49f006cb90c2d4dde58

        SHA256

        be932154ec7f413bab9c9a9267cc4d59fc1e36eaa138c852804795acc3b07a82

        SHA512

        042a56a08582adb379ab51cd5a68eb1fbe443386cce7b1b8dcd2cddf4d47e4b7567344242af858b71da484727678b29ffa16807e44e35aa84b959f3adfd5463f

      • C:\ProgramData\DDF0.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Temp\DDDDD

        Filesize

        146KB

        MD5

        1916699a2426286792774b00c701d27f

        SHA1

        a730410c607c8f2919ad33c02175320c27dade21

        SHA256

        3c85457836f3744e958438917bf5dd6a9e23e474b3dde2417a6e69b99bade022

        SHA512

        98f31eb09cbd8c2d988750ddf4a0e5afbf78d38fd15d1d92c9b8dc903643112a90602b7641c5b56ac2ed53299a7eb1d39ad199d172e2defe2cdbc96f6ed634bb

      • F:\$RECYCLE.BIN\S-1-5-21-2212144002-1172735686-1556890956-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        d42d54b330e293cbdad797b8c3416eb9

        SHA1

        009cc24d6d5421aaaed6b631305b96a8a9951bde

        SHA256

        222125288b4381536255a60939cd235cc8042ebefd429a4e28774a73c922a8c3

        SHA512

        9482e5f446c62d6d5474da3dc8957c9d5694d14004801874e6e9e89f0394c92425582941e3eded51145d0b848e78f064c582bca741f7958ed859029953bf71d3

      • memory/2072-0-0x0000000000CE0000-0x0000000000D20000-memory.dmp

        Filesize

        256KB

      • memory/2964-3577-0x00000000022A0000-0x00000000022E0000-memory.dmp

        Filesize

        256KB

      • memory/2964-3579-0x000000007EF20000-0x000000007EF21000-memory.dmp

        Filesize

        4KB

      • memory/2964-3578-0x000000007EF80000-0x000000007EF81000-memory.dmp

        Filesize

        4KB

      • memory/2964-3576-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

        Filesize

        4KB

      • memory/2964-3609-0x000000007EF60000-0x000000007EF61000-memory.dmp

        Filesize

        4KB

      • memory/2964-3608-0x000000007EF40000-0x000000007EF41000-memory.dmp

        Filesize

        4KB