Resubmissions

11-12-2024 15:32

241211-sy44nssrdm 10

09-08-2024 21:57

240809-1t1vfs1cpm 10

06-08-2024 13:01

240806-p9f97szdlm 10

06-08-2024 12:52

240806-p3672stdkg 10

06-08-2024 12:29

240806-ppa8fsygqr 10

06-08-2024 12:26

240806-pmc92ashlh 10

Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 12:26

General

  • Target

    1/f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23.exe

  • Size

    146KB

  • MD5

    314275168bf7958219662a242dbfe8a7

  • SHA1

    d629032d9d8f491d133ee26a230c393335d7ad74

  • SHA256

    f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23

  • SHA512

    b5246db461ee78d622a33a758b3d178208b88e0b9e98185f17ee95f2fbbcf66b1059afece1dd5b586d01587bc01662491a6baab208b9836d4b4b9efc55f14c2f

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUSx:V6gDBGpvEByocWeauV2gvzwUA

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3C73B3FA82B7C052F2 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (352) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23.exe
    "C:\Users\Admin\AppData\Local\Temp\1\f28599b06560617bccdfb56acc841f3e642ff51b9956632fcc4204f026711e23.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\ProgramData\AAD0.tmp
      "C:\ProgramData\AAD0.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:696
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\AAD0.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1056
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x14c
    1⤵
      PID:2812
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\CompressPing.txt.7V7uPExzv
      1⤵
      • System Network Configuration Discovery: Internet Connection Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\Desktop\CompressPing.txt.7V7uPExzv"
        2⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\desktop.ini

      Filesize

      129B

      MD5

      edf683e166ec19c97c8b699e178de4b1

      SHA1

      a8c5b86d18e769d5b6bc085f5db0fc4d57da208e

      SHA256

      97226fd6eaad018aee7c2f73048a68e062f453ffe46e20715eb14a995d9b7e70

      SHA512

      2207a0a72dcc4282d1934cefb65a89a04a93a2e4a2a6c97741f7b383ef36711876a93de6a63cbf2a81c482ba22025848c1a422c3d69d94bd4f21b6758fa81d0f

    • C:\7V7uPExzv.README.txt

      Filesize

      1KB

      MD5

      1d3fd07dca0195eafc19fa126bb8fbe1

      SHA1

      c196cf623371f71624a10e0919326647028150ff

      SHA256

      ba7eed2a630bf8c7507b765bb98c3ba493f3ab016509c93ef4ed8e3ed48ebc89

      SHA512

      9f331b0bc046b981b03cefc7edfdd0e3504ceac0d6d34d965a27a6f6be60e1693e3f7e497a5306221614afd15a19892510ff11c317a5e3e2e5773ac5aed1f932

    • C:\Users\Admin\AppData\Local\Temp\1\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      146KB

      MD5

      7a986c94755162faaef94d2b0b93d278

      SHA1

      ce89667fb12d00f671f4515f7738d7c6f05c2163

      SHA256

      52c49497c4eeb982aba736231159d3ab4295d413d4ecbf32dd4675ad88d45a9d

      SHA512

      b9e1997ada496caf79a091a1a3e4f7e01ee7a0c80210e983b90e1b475589413d1f8e2c1c6b25abbe05dab481fc6f2718c3a9e6b681512f4aa1fd31671dda6e9a

    • C:\Users\Admin\Desktop\CompressPing.txt.7V7uPExzv

      Filesize

      297KB

      MD5

      61ec7df0fa2f724eb2f0a34f3fe65345

      SHA1

      cac66c9445a3cd77579d1573a87e2339bba7ede7

      SHA256

      6487f323214847f49f65cadea20edd88ddba4042f7da73c57e42a4e17529852c

      SHA512

      7f0b7de71ff3b80c3fb71c707f61884f877fd24b5dc78366f6d85f4d9421fbb8428ad7f61f708962f8544bf7d9ae47b5a76d5af67ea699948d078fb6d36505c5

    • F:\$RECYCLE.BIN\S-1-5-21-2257386474-3982792636-3902186748-1000\FFFFFFFFFFF

      Filesize

      129B

      MD5

      ae86596a0dfaf02f322af5d6f49aec18

      SHA1

      6c5ed7316e4870d7284a1faa5cb19e93372f9f2a

      SHA256

      16b6f5633c394aa3075c1b47937f40297ce1423bb56e76f4756bb1cc498b0609

      SHA512

      cfb9b70d8ac474425a5daa37975e1364d4db1bdb28adec35b4becfb79bc79a7024a7eda72b62e4b8a97480eb38a685648d065c5aae476f40ea23d12dc0f73693

    • \ProgramData\AAD0.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/696-892-0x000000007EF20000-0x000000007EF21000-memory.dmp

      Filesize

      4KB

    • memory/696-891-0x000000007EF80000-0x000000007EF81000-memory.dmp

      Filesize

      4KB

    • memory/696-890-0x0000000002070000-0x00000000020B0000-memory.dmp

      Filesize

      256KB

    • memory/696-889-0x0000000002070000-0x00000000020B0000-memory.dmp

      Filesize

      256KB

    • memory/696-922-0x000000007EF60000-0x000000007EF61000-memory.dmp

      Filesize

      4KB

    • memory/696-921-0x000000007EF40000-0x000000007EF41000-memory.dmp

      Filesize

      4KB

    • memory/696-888-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

      Filesize

      4KB

    • memory/2208-0-0x00000000007C0000-0x0000000000800000-memory.dmp

      Filesize

      256KB