Analysis

  • max time kernel
    147s
  • max time network
    155s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    14-07-2024 13:25

General

  • Target

    1.exe

  • Size

    146KB

  • MD5

    314275168bf7958219662a242dbfe8a7

  • SHA1

    d629032d9d8f491d133ee26a230c393335d7ad74

  • SHA256

    f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23

  • SHA512

    b5246db461ee78d622a33a758b3d178208b88e0b9e98185f17ee95f2fbbcf66b1059afece1dd5b586d01587bc01662491a6baab208b9836d4b4b9efc55f14c2f

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUSx:V6gDBGpvEByocWeauV2gvzwUA

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3CF31FEC0630815EB2 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (506) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1.exe
    "C:\Users\Admin\AppData\Local\Temp\1.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5644
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:5280
    • C:\ProgramData\CD05.tmp
      "C:\ProgramData\CD05.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\CD05.tmp >> NUL
        3⤵
          PID:2852
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:4720
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{DE54664E-E0C5-4908-8135-5359BE4BC89B}.xps" 133654371943060000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2816

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-514081398-208714212-3319599467-1000\HHHHHHHHHHH

        Filesize

        129B

        MD5

        23fc60e6fbf4c93cc695843bc49d3a55

        SHA1

        3a61f7ec9af1312f50174f327075319e9dbd8277

        SHA256

        d365fb861bb9dc5fb3d2ca977a0c73c110167fb104ac4fd8c02221f65b75060e

        SHA512

        b222f266f5d83f55ba3e89b8c7425330055f3ab55af441224ea12abe971fa91eab9aafcfebe3ac13d18f7ba3b0e9be341bd6dc6fef31625892063828bc226b26

      • C:\7V7uPExzv.README.txt

        Filesize

        1KB

        MD5

        ab429b52b0ffbb47d164ce5339cfbc5e

        SHA1

        52aa00dac6eaf0965f90989b0e3559e27c346c12

        SHA256

        72a77b9f3f19cf07d8e2fa9c252f06c85b83a618504a938bda1197a1a86ac82f

        SHA512

        69f3b97d9157275bbe6f96752fba0aaedcc7b19bf9faadd15e9a4830099980a48f7cb3cc266f271d7ae54365c191d4f550e7eac1f9d545573b833895115e4d35

      • C:\ProgramData\CD05.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Temp\DDDDD

        Filesize

        146KB

        MD5

        42ffcae01e9acb467d9803b77d04816b

        SHA1

        25bab68af73846413f934294389c2e16cdf92df5

        SHA256

        865e0da9d0bdbdc3ece9ce3f9a4b9091a2a6b939e67fb6ad3f382e3945c00cf0

        SHA512

        759a600c6f59703cd9db5cc4fb1004aeb9e649a884bdb102a211ba4ebd91b21f24b171b7ff6993c1fe102d4ff700251d9fdfe5c5a85ec69d746258abfdab7530

      • C:\Users\Admin\AppData\Local\Temp\{EC195F02-FC71-45C1-AC70-BAEF7D244112}

        Filesize

        4KB

        MD5

        0e2c27c4a0c906592c072a2abed50872

        SHA1

        eac450c261789f56cf40fb77b028b4660dadedd6

        SHA256

        03542b1e90f7c1c23e52a0dc7a87ef6a7ce00507addd7f746c61b3429c46398f

        SHA512

        066662c1822d29770c23ee0f992e18186140b85a03d11a8268a208859bee21bbf194988f2e9bb3839f9c4fc395668c6e950830c6759b309c2298cd19197b76aa

      • C:\Users\Admin\AppData\Local\Temp\{EF4063DE-393E-4C9B-9711-C57AE5D03C36}

        Filesize

        4KB

        MD5

        cb53223a8520b33657c7a3a47fcb65f5

        SHA1

        4144c6d84cf629c5c4f90d01fab0fd24674889a4

        SHA256

        387a3f0c3b8882b98677f0a8b1510896837bc90c25f0c5d94bc7407de4d73c04

        SHA512

        f332db3f532370c3797f86bf0439c8ddc1c29eb861fc3fe012a14a66a3a48a12e35744a1c1af01c7cae29bbecd4aeb5f36e53212c50ea7a5a91358861881d722

      • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

        Filesize

        4KB

        MD5

        50098f337b00327af9e7bc4272ca092c

        SHA1

        ce615b15b381b4d1e5062c03214a9ed609d34b26

        SHA256

        39a4d2c8460bf77441ff2c6a48e573e3c62a276020c7e3f1d989f9b753684fc5

        SHA512

        beaa3629e825331b3cf24a7db9fa5d6b3448c57ba2f890a397b4f0b88a8c51db1e9ef62c26f234fb5463adce2cb2c35e14aa874fd60802c8e7cacaa75084d185

      • F:\$RECYCLE.BIN\S-1-5-21-514081398-208714212-3319599467-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        82ec81a69503c868b77339fdebe4bc23

        SHA1

        a51c86ac5fc8ab5631a56e100d7fdca387baad36

        SHA256

        c2d2fe5fcad29db7d5be9990231b45e52a511704ec9e3a84d22fe6b184be40d8

        SHA512

        55cb5fe55b827200fa85b60b1c9008d039ceb37a82dad7239e0a1150181d06e672f19977d955afcfb51d2dafd8f9c105ad0ac7e1ad5f48fe1631a1b3680f2041

      • memory/2816-2887-0x00007FFCEEF90000-0x00007FFCEEFA0000-memory.dmp

        Filesize

        64KB

      • memory/2816-2884-0x00007FFCEEF90000-0x00007FFCEEFA0000-memory.dmp

        Filesize

        64KB

      • memory/2816-2883-0x00007FFCEEF90000-0x00007FFCEEFA0000-memory.dmp

        Filesize

        64KB

      • memory/2816-2882-0x00007FFCEEF90000-0x00007FFCEEFA0000-memory.dmp

        Filesize

        64KB

      • memory/2816-2885-0x00007FFCEEF90000-0x00007FFCEEFA0000-memory.dmp

        Filesize

        64KB

      • memory/2816-2916-0x00007FFCEC760000-0x00007FFCEC770000-memory.dmp

        Filesize

        64KB

      • memory/2816-2917-0x00007FFCEC760000-0x00007FFCEC770000-memory.dmp

        Filesize

        64KB

      • memory/5644-2-0x0000000002D30000-0x0000000002D40000-memory.dmp

        Filesize

        64KB

      • memory/5644-0-0x0000000002D30000-0x0000000002D40000-memory.dmp

        Filesize

        64KB

      • memory/5644-1-0x0000000002D30000-0x0000000002D40000-memory.dmp

        Filesize

        64KB