Resubmissions

02-08-2024 12:16

240802-pfv69s1drg 10

02-08-2024 12:15

240802-pe6ava1dra 10

02-08-2024 12:14

240802-pefp7a1dqh 10

02-08-2024 12:06

240802-n97ays1dpa 10

01-08-2024 01:57

240801-cdsl5szgma 10

Analysis

  • max time kernel
    122s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 01:57

General

  • Target

    1/0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe

  • Size

    146KB

  • MD5

    2357ecbcf3b566c76c839daf7ecf2681

  • SHA1

    89d9b7c3eff0a15dc9dbbfe2163de7d5e9479f58

  • SHA256

    0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305

  • SHA512

    bb5630ae44e684f2dfc74478c57bf97a94045501a64022d563e87f2a60d777307cab2b5a14e6764d25a2fd1f27901624c1ee76ca551d5a5e3a21abc4befef401

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUS:V6gDBGpvEByocWeauV2gvzwU

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3C1BA1344DC365B9D4 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (355) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe
    "C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\ProgramData\275E.tmp
      "C:\ProgramData\275E.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\275E.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2528
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:2656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3294248377-1418901787-4083263181-1000\GGGGGGGGGGG

      Filesize

      129B

      MD5

      1e51d20bca1f56f1efc39fc0e755dbbc

      SHA1

      f010ba4416dcda71e8e58710cf069ec6fabef56f

      SHA256

      6a537f7ea6606f677d9a9dc948c2c6832a17862d9835fd2f337a69bd0830aa9d

      SHA512

      fde0e21a9a7557150c3b057203b24cc7d2821e368e26d9e96693ed3a5d95ac9619987a085079c5911080be1b482d17c0db3ff4f68941b9bb154e31b43ed5b6aa

    • C:\7V7uPExzv.README.txt

      Filesize

      1KB

      MD5

      98f3b907cc6fd0904e5d7aa84a339c28

      SHA1

      06920e4ae25f738e5021881e0296bf97ebae6f33

      SHA256

      bad4f512f8c8c187c9e114c45af959462ba315732f7d3ebe1f4576753ffc89a5

      SHA512

      82b6308b9b0952a48765d58f17c3e8ab61ad0238427789ee636b939ba67435e79a0cb55abc5bc9e01d269b0f5e458bea53f2e2d20e871ba1689cffa9e154227c

    • C:\ProgramData\275E.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\1\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      146KB

      MD5

      123dc4fd1c28b93666f16fe547107094

      SHA1

      8e0a13bf444c884d67723f9a3ff3bb0db7314282

      SHA256

      000311cd4b2e41b00c30f24e22e5e94734ad1e2649063c955decd08862496c75

      SHA512

      017e5044bb8366d74f72ec87b63e66869488bcb8e0810732c2a8eb17cf434b5ad3383c3da34a174248e16be7c2d096db591785dd7690d532ed3327789d03140f

    • F:\$RECYCLE.BIN\S-1-5-21-3294248377-1418901787-4083263181-1000\FFFFFFFFFFF

      Filesize

      129B

      MD5

      2d5515fce161e79ae583238cdb9933ff

      SHA1

      9d0d4e81b0f5b9898df95652186dbacf2684d2e8

      SHA256

      353d0547eb42030fa607768eb5fd03970e0d0750dfe04029278e9af398095a9d

      SHA512

      00f717237df6f63731e3a3fec6303db2bcb06f422d41ede9e6f08db84230903b5e2dc4fbea45a643748578cc274c07ff818fb66be109dd4ce3f2c05bb6aeaafd

    • memory/904-892-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/904-895-0x000000007EF20000-0x000000007EF21000-memory.dmp

      Filesize

      4KB

    • memory/904-894-0x000000007EF80000-0x000000007EF81000-memory.dmp

      Filesize

      4KB

    • memory/904-893-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/904-891-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

      Filesize

      4KB

    • memory/904-925-0x000000007EF60000-0x000000007EF61000-memory.dmp

      Filesize

      4KB

    • memory/904-924-0x000000007EF40000-0x000000007EF41000-memory.dmp

      Filesize

      4KB

    • memory/2852-0-0x00000000001C0000-0x0000000000200000-memory.dmp

      Filesize

      256KB