Resubmissions

11-12-2024 15:32

241211-sy44nssrdm 10

09-08-2024 21:57

240809-1t1vfs1cpm 10

06-08-2024 13:01

240806-p9f97szdlm 10

06-08-2024 12:52

240806-p3672stdkg 10

06-08-2024 12:29

240806-ppa8fsygqr 10

06-08-2024 12:26

240806-pmc92ashlh 10

Analysis

  • max time kernel
    48s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-08-2024 13:01

General

  • Target

    1/0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe

  • Size

    146KB

  • MD5

    2357ecbcf3b566c76c839daf7ecf2681

  • SHA1

    89d9b7c3eff0a15dc9dbbfe2163de7d5e9479f58

  • SHA256

    0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305

  • SHA512

    bb5630ae44e684f2dfc74478c57bf97a94045501a64022d563e87f2a60d777307cab2b5a14e6764d25a2fd1f27901624c1ee76ca551d5a5e3a21abc4befef401

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUS:V6gDBGpvEByocWeauV2gvzwU

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3CA4035F465EA9AFB4 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (669) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe
    "C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:3972
    • C:\ProgramData\F04C.tmp
      "C:\ProgramData\F04C.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\F04C.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:728
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:2892
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{31541F1C-A867-4D4C-93F4-2903556AA314}.xps" 133674229682460000
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        PID:3808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-355097885-2402257403-2971294179-1000\QQQQQQQQQQQ

      Filesize

      129B

      MD5

      137cbbc0beca25fb3d96be08745f9bae

      SHA1

      e1192c2831d750e772410f5d0cf77591e4842ab0

      SHA256

      099e2828c84c5d9a698d25dd0809c8e0a534925ed263a190be0728079962debb

      SHA512

      a8fc18175f8346748e60b12fc1e42a7bc0f0a75613c378f94cfbf20fe109e31d13441c212e7da83fc76323d0c920aa7fd58ef17a4eab3e78e0c1cd3db186956d

    • C:\7V7uPExzv.README.txt

      Filesize

      1KB

      MD5

      223f275fdc9eafe750940182e095d3dc

      SHA1

      dd57f224f741df0bbf2aeb653b7c603c5f674398

      SHA256

      0da123ecda1c5b72db339b00c61d2529a0eb9d775c30277365b69ccc45eeef19

      SHA512

      ac2a3ce9360b6c8f2933a3186eed05bc7e450deaeee3941740837649b6b1fd53d32faedb95466fed6b2bd35e6c80cc58a9464b0545e92897caf228b02037d494

    • C:\ProgramData\F04C.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\1\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      146KB

      MD5

      ccd9ff12ed4695194e8ec401c99b6d9a

      SHA1

      1a0ffc3612a5ae2a11a92d69c4c201026001a44a

      SHA256

      893e4a0d726bf1c0b0e83227638d50ca050b85aecee8354913dbc485300ad41a

      SHA512

      13b9a15411d42e809cbaf666cb300a91d2befd7ed62892877d0c2fe2456ad6390f5d86a22cfe313d04e8f2917f870ab48320219ef002d1a907f9c4f676fa32b3

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      132KB

      MD5

      437a4d367dee9fe11594f0da8674764e

      SHA1

      2b414e1b2f1c754268d94858e4ed45134814270b

      SHA256

      b17160d54cf4c145f02254d52420adc6d585654ef4f42597b95d149f413ab459

      SHA512

      0468674594643c1c752058c6924b602fb16bb4cf024442dfa7be969e70b1d3255a00914f99c84fae180a4dd96c34613bbe2a6a17ce0f0ea29601b3cce96499ed

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      4KB

      MD5

      9ba85dcb106a98dbdc655665b8cb5ea8

      SHA1

      1d42856672c85248832227566a2d016a987ca000

      SHA256

      deba6b1c955d310e2d96cf4a980b1ddc34a2d189648395a397d5418ffb921826

      SHA512

      4e6d18ec12bb20adff6fd52f0c04f5b5c9693e0b0e45fabba55198cc721e078f66859941317ac7dab7f199428d22643a041815e8881c5e260a7762abdb3b3f36

    • F:\$RECYCLE.BIN\S-1-5-21-355097885-2402257403-2971294179-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      f2b9d244d15fbe7fe40feb6639dbf74f

      SHA1

      0f12cb8a35ddf2e6915af07323704a6bd03f895e

      SHA256

      7ea6c57ee06fc5b6f6238997413578633829a43473aae897acc11c565708126e

      SHA512

      ab5ba9521bf6d18450e71310ad61be9e259c5bad972539bb797aca40082ee650e8f6f1145cd1cf44e7462a49fb313e8198fa54937bad77ab31f060b006d7b84b

    • memory/2540-1-0x0000000000700000-0x0000000000710000-memory.dmp

      Filesize

      64KB

    • memory/2540-0-0x0000000000700000-0x0000000000710000-memory.dmp

      Filesize

      64KB

    • memory/2540-2-0x0000000000700000-0x0000000000710000-memory.dmp

      Filesize

      64KB

    • memory/3808-3031-0x00007FF8D8730000-0x00007FF8D8740000-memory.dmp

      Filesize

      64KB

    • memory/3808-3033-0x00007FF8D8730000-0x00007FF8D8740000-memory.dmp

      Filesize

      64KB

    • memory/3808-3034-0x00007FF8D8730000-0x00007FF8D8740000-memory.dmp

      Filesize

      64KB

    • memory/3808-3035-0x00007FF8D8730000-0x00007FF8D8740000-memory.dmp

      Filesize

      64KB

    • memory/3808-3032-0x00007FF8D8730000-0x00007FF8D8740000-memory.dmp

      Filesize

      64KB

    • memory/3808-3064-0x00007FF8D64F0000-0x00007FF8D6500000-memory.dmp

      Filesize

      64KB

    • memory/3808-3065-0x00007FF8D64F0000-0x00007FF8D6500000-memory.dmp

      Filesize

      64KB