Resubmissions

11-12-2024 15:32

241211-sy44nssrdm 10

09-08-2024 21:57

240809-1t1vfs1cpm 10

06-08-2024 13:01

240806-p9f97szdlm 10

06-08-2024 12:52

240806-p3672stdkg 10

06-08-2024 12:29

240806-ppa8fsygqr 10

06-08-2024 12:26

240806-pmc92ashlh 10

Analysis

  • max time kernel
    47s
  • max time network
    28s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06-08-2024 12:52

General

  • Target

    1/0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe

  • Size

    146KB

  • MD5

    2357ecbcf3b566c76c839daf7ecf2681

  • SHA1

    89d9b7c3eff0a15dc9dbbfe2163de7d5e9479f58

  • SHA256

    0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305

  • SHA512

    bb5630ae44e684f2dfc74478c57bf97a94045501a64022d563e87f2a60d777307cab2b5a14e6764d25a2fd1f27901624c1ee76ca551d5a5e3a21abc4befef401

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUS:V6gDBGpvEByocWeauV2gvzwU

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3CE0EAD6D3C34B3532 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (537) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe
    "C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1420
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:1340
    • C:\ProgramData\BDD3.tmp
      "C:\ProgramData\BDD3.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\BDD3.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1000
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:3572
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{D582DB71-A716-4FCE-9B58-7C2C39474A02}.xps" 133674223739540000
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        PID:3432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3761892313-3378554128-2287991803-1000\AAAAAAAAAAA

      Filesize

      129B

      MD5

      674f385f62f36a0aaed4bb9155a88578

      SHA1

      b68b74be0177a11ea04471de3fa7943ebf9a4a7b

      SHA256

      248a0fe8116b73acae3cc6587dacf905cadff7d76a88600fa977d337763d4f1d

      SHA512

      b7ddda4606e0e625b94ea8ea417cd0a7a278879266b4e7c57489e024024aa90d6a873e1a02c65861661545aafaf923760fd6b0955d45e260e187207f12e81b8c

    • C:\7V7uPExzv.README.txt

      Filesize

      1KB

      MD5

      31b0d626b12ecb29314b7ad6088cd76f

      SHA1

      3eb690d4cafe4a9ca497c5499eb1af8d1b2ed436

      SHA256

      0aefdb32747077e5725edac9477ef3c57b3adac4ef280f8f93280afea5917cbb

      SHA512

      01a30da8ac4b7ed3b36e18ea1fb9ab60ce13c78a5edf03b3d65a4c0d064cc9c707f9b2dd8f47880e44ae97f3c4feb61fd9e9e70fb2e53c5605134b2ae27db448

    • C:\ProgramData\BDD3.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\1\EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE

      Filesize

      146KB

      MD5

      194bacf2d01e2d7b70d0c790ab10b831

      SHA1

      72a4f7207ce8bdc63287e6ad5b83b33426a562b2

      SHA256

      56fb98b20eca8a5ea8a3347bb16f9472c68d121668a552bc33982c856e9cc074

      SHA512

      823da1d151891d084508c55f5a041a7b8bf63642508aeca7ce1c4a9ca432f490fe14e87a4b2d25a618fb4027f638110b76ecc4310c914fb4391546c51a72d576

    • C:\Users\Admin\AppData\Local\Temp\{D6E0BB16-D68D-42FE-8447-B8A9DD98C910}

      Filesize

      4KB

      MD5

      7ee481f333f4f726e9dfcfbd10bfc3ea

      SHA1

      e04a49db0108f9de0b71eb87976a8c5c62b5cf2f

      SHA256

      a5d218e1e800a2d80f0e3413368ed73dad50ee39293bbad2de76e70605555607

      SHA512

      5f1b73370c89edd0f4d1be7971f650eaee0319b1744fec86b7fda8f08ec00727292cdc3f792033c1a9b25b15f334d5bac231113601d44b29bd469d2c1bb483f4

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      4KB

      MD5

      e28c993c628e782a9b94624ff5466ca7

      SHA1

      f367330207ad1831a40b3fbc30614ed54842894b

      SHA256

      9619130b7afa1305b0245508d23ff477d182cbb55b44ce9972a3b594bb9b1e92

      SHA512

      3e3ce366f40b7599250a999661ad9d7678809a585dc8bfe28a1723e3520b87487fc8ced8ff7e43be54315ead2d77265e55b85d3488865b0a9afec4c371daa4e6

    • F:\$RECYCLE.BIN\S-1-5-21-3761892313-3378554128-2287991803-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      0ea4e5c1736d61ed02d7f16dd6b8e2b4

      SHA1

      e9d30b930856597c047fa44e43d79b45b0c99fb4

      SHA256

      883d21a0d055f2d24bc742efa88094e76b5c458b0d9930362099319c4f52e89a

      SHA512

      dc91569a71a1dc9bf7bc83d7dc71e01c585a7e2ad80bddb85ab3fc5515035aced6148e55be230b30b016597c59ed84189a5a8817d67dc63916b2a1bbff0aa5df

    • memory/1420-0-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/1420-2-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/1420-1-0x0000000002800000-0x0000000002810000-memory.dmp

      Filesize

      64KB

    • memory/3432-2782-0x00007FFEE4F10000-0x00007FFEE4F20000-memory.dmp

      Filesize

      64KB

    • memory/3432-2781-0x00007FFEE4F10000-0x00007FFEE4F20000-memory.dmp

      Filesize

      64KB

    • memory/3432-2780-0x00007FFEE4F10000-0x00007FFEE4F20000-memory.dmp

      Filesize

      64KB

    • memory/3432-2779-0x00007FFEE4F10000-0x00007FFEE4F20000-memory.dmp

      Filesize

      64KB

    • memory/3432-2777-0x00007FFEE4F10000-0x00007FFEE4F20000-memory.dmp

      Filesize

      64KB

    • memory/3432-2812-0x00007FFEE2670000-0x00007FFEE2680000-memory.dmp

      Filesize

      64KB

    • memory/3432-2813-0x00007FFEE2670000-0x00007FFEE2680000-memory.dmp

      Filesize

      64KB