Analysis

  • max time kernel
    65s
  • max time network
    24s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    15-07-2024 08:50

General

  • Target

    1/0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe

  • Size

    146KB

  • MD5

    2357ecbcf3b566c76c839daf7ecf2681

  • SHA1

    89d9b7c3eff0a15dc9dbbfe2163de7d5e9479f58

  • SHA256

    0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305

  • SHA512

    bb5630ae44e684f2dfc74478c57bf97a94045501a64022d563e87f2a60d777307cab2b5a14e6764d25a2fd1f27901624c1ee76ca551d5a5e3a21abc4befef401

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUS:V6gDBGpvEByocWeauV2gvzwU

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3CE7B2EE7449FA9B6F >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (336) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe
    "C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2508
    • C:\ProgramData\C10E.tmp
      "C:\ProgramData\C10E.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\C10E.tmp >> NUL
        3⤵
          PID:2288
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x14c
      1⤵
        PID:888

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-2172136094-3310281978-782691160-1000\AAAAAAAAAAA

        Filesize

        129B

        MD5

        751c767d81a717dc4c96024e9e88518c

        SHA1

        0019c4f49e03c3980752834d6855104d12e89593

        SHA256

        20db120b2728e3893b844720dca6800261d3b62cec26a4c31617d60297785339

        SHA512

        56aea4b38c101f0c9e4db7642a501305241e2f38d746e655a652e728c631998d0d64ddd1960d568b35afb13bc61dfb9b99fa26ca9a751c2625de84df163c6917

      • C:\7V7uPExzv.README.txt

        Filesize

        1KB

        MD5

        832c39b2d01072c93f75cffffa1f8117

        SHA1

        e56ed7be9c3f5fef7268a79e6f69991bde6bea6d

        SHA256

        efa3fc5320a2d3f3c90ce542b9b343918ecd3114ead1d0a7ad8d13a69a2848a1

        SHA512

        2adbe6f8bf06ae46005c347d95fbd791b65d4bb5a863e8c853afc90e1b3189636e623dbbe09274e747abb1b4e65a05af2268f7025c4c2d6aef2264e85795c65b

      • C:\Users\Admin\AppData\Local\Temp\1\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

        Filesize

        146KB

        MD5

        7b933181aa7e3d69883c5ce32db9c5dc

        SHA1

        a20bc3e14a6500e9dc6245fb47a1164c6ce86e2d

        SHA256

        3099691c06c06f8fe67aeea0cae0e5ead0789adda3e47253ba135a608e1491c9

        SHA512

        3d3cd0af3f217e0743b9cd9e9764d708e40d790a7b65822a60c0df96f40fdefb6f022f8c5a78edcd6408bb4fd49a529c0ff7740b1231fd9ede0da63be748e8f2

      • F:\$RECYCLE.BIN\S-1-5-21-2172136094-3310281978-782691160-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        8da87cc3378808373b42776b81dd318d

        SHA1

        88e855fdd102706f979939aff66668c03cdb1acc

        SHA256

        843f5f1b938034d6bbd4151f53ca7a1bc163ba98af9c203532c343ea6fd1aba0

        SHA512

        5d52d47231d08ac4715260a5dfa044827eb8ed2f4eba0b6919eaf64b16cb7b079ec7f5320d1abfecaca2bbd20ae484775f84bd671b132522c9c0e9f7652f5c9b

      • \ProgramData\C10E.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • memory/2196-876-0x000000007EF20000-0x000000007EF21000-memory.dmp

        Filesize

        4KB

      • memory/2196-875-0x000000007EF80000-0x000000007EF81000-memory.dmp

        Filesize

        4KB

      • memory/2196-874-0x0000000002000000-0x0000000002040000-memory.dmp

        Filesize

        256KB

      • memory/2196-873-0x0000000002000000-0x0000000002040000-memory.dmp

        Filesize

        256KB

      • memory/2196-871-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

        Filesize

        4KB

      • memory/2196-906-0x000000007EF60000-0x000000007EF61000-memory.dmp

        Filesize

        4KB

      • memory/2196-905-0x000000007EF40000-0x000000007EF41000-memory.dmp

        Filesize

        4KB

      • memory/2508-0-0x0000000002300000-0x0000000002340000-memory.dmp

        Filesize

        256KB