Resubmissions

11-12-2024 15:32

241211-sy44nssrdm 10

09-08-2024 21:57

240809-1t1vfs1cpm 10

06-08-2024 13:01

240806-p9f97szdlm 10

06-08-2024 12:52

240806-p3672stdkg 10

06-08-2024 12:29

240806-ppa8fsygqr 10

06-08-2024 12:26

240806-pmc92ashlh 10

Analysis

  • max time kernel
    226s
  • max time network
    234s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    06-08-2024 12:29

Errors

Reason
Machine shutdown

General

  • Target

    1/0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe

  • Size

    146KB

  • MD5

    2357ecbcf3b566c76c839daf7ecf2681

  • SHA1

    89d9b7c3eff0a15dc9dbbfe2163de7d5e9479f58

  • SHA256

    0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305

  • SHA512

    bb5630ae44e684f2dfc74478c57bf97a94045501a64022d563e87f2a60d777307cab2b5a14e6764d25a2fd1f27901624c1ee76ca551d5a5e3a21abc4befef401

  • SSDEEP

    3072:V6glyuxE4GsUPnliByocWepo2NVLiguo/pyEwUS:V6gDBGpvEByocWeauV2gvzwU

Malware Config

Extracted

Path

C:\7V7uPExzv.README.txt

Ransom Note
~~~NULLBULGE LOCK - BASED ON LOCKBIT~~~ >>>> Your data is encrypted... but dont freak out If we encrypted you, you majorly fucked up. But... all can be saved But not for free, we require an xmr payment >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption. Life is too short to be sad. Dont be sad money is only paper. Your files are more important than paper right? If we do not give you decrypter then nobody will pay us in the future. To us, our reputation is very important. There is no dissatisfied victim after payment. >>>> You may contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait a while Links for Tor Browser: http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/ Link for the normal browser http://group.goocasino.org https://nullbulge.com >>>> Your personal DECRYPTION ID: 217B9D5D58C4AD3C286B32F8F9DCF750 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems!
URLs

http://nullblgtk7dwzpfklgktzll27ovvnj7pvqkoprmhubnnb32qcbmcpgid.onion/

http://group.goocasino.org

https://nullbulge.com

Signatures

  • Renames multiple (342) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 4 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe
    "C:\Users\Admin\AppData\Local\Temp\1\0fb86a8ba8fdf57990c283080a671c1320cbcdfd0e8b5f5a250d9c38a6fce305.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\ProgramData\DB42.tmp
      "C:\ProgramData\DB42.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\DB42.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1732
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\7V7uPExzv.README.txt
    1⤵
    • Opens file in notepad (likely ransom note)
    PID:572
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:1984
    • C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe
      "C:\Program Files\Microsoft Games\Purble Place\PurblePlace.exe"
      1⤵
      • Drops desktop.ini file(s)
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1888
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1736
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
        • System Location Discovery: System Language Discovery
        PID:2692
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:2620
        • C:\Windows\system32\csrss.exe
          %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
          1⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          • Suspicious use of WriteProcessMemory
          PID:2316
        • C:\Windows\system32\winlogon.exe
          winlogon.exe
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of WriteProcessMemory
          PID:2428
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x0
            2⤵
              PID:2124
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x1
            1⤵
              PID:912

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\$Recycle.Bin\S-1-5-21-2703099537-420551529-3771253338-1000\DDDDDDDDDDD

              Filesize

              129B

              MD5

              b0b8bb8b7906d1861f0a103ecfae1981

              SHA1

              96b28a08f591e578adb14a50cfcfca2a269d00fa

              SHA256

              0aa4cd4ade5750862a0109cdef99d663a948e986a78638d6eab4a97f38ad4937

              SHA512

              a2ae83aee3399f28517249cfaa54217c15a4e4fdc559e561c9a60a7bacfd5d679f30253b116b1baed5cfc52e1f2c6e06b458b22c535cfba83044da98a775b8df

            • C:\7V7uPExzv.README.txt

              Filesize

              1KB

              MD5

              311c4037f3a7c235dd502bc4edde36d4

              SHA1

              add566472b17172ae95ae23836a9f3b3dd4f4622

              SHA256

              3db2d979ffe8d66d71a8be5146fa3fb05dc104ac6b84d529cdde11fc8821131e

              SHA512

              fab70444dc0e2657d5e07ee60cbf1ee77ba549493547ed16fe456647ae90429ef6b1dce218c942859e87319c814bf9c16fde75b6344a7194cbc27f6bafac4071

            • C:\Users\Admin\AppData\Local\Microsoft Games\Purble Place\ConcentrationScoresAndSettings.xml

              Filesize

              12KB

              MD5

              ee51a9063a2bd12be1283abea9dd28ee

              SHA1

              50404d233902762543886b7a1a79e76e7dcec0a1

              SHA256

              bd5b02477d3bf53be7ab8f9cbf14bd7738216b127519f243671a08c8e8518bb9

              SHA512

              2fbb39233ea478456d1f14e21326446c307322ca796c056b89239f5b1bb156c3bf20be8ec03cff3e7e5301d57fb38a912813e3de236e8b76c9dfd46a959cd966

            • C:\Users\Admin\AppData\Local\Temp\1\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

              Filesize

              146KB

              MD5

              1ec48d038cbf118bcecf950b6c2914cf

              SHA1

              babcd68998a061f9fe47a84b5e3021c23562c6b1

              SHA256

              6dafb54ceb8fd4c1cb21c241c7c3e091d7f3daf2c3573a8effc90efe25caa580

              SHA512

              23494c97aee3809b9b45a6ae30d8742be08259717b2cd14cf2a80169e401d6dd938de06c2923c7c85870d4cb885b8d153a34a486a01dfb21b77dda1484a95b8b

            • F:\$RECYCLE.BIN\S-1-5-21-2703099537-420551529-3771253338-1000\DDDDDDDDDDD

              Filesize

              129B

              MD5

              a68464fba4173baf49fa93fc0a00abb4

              SHA1

              b754c575077d853d6c14601e23f1082242ce6908

              SHA256

              800536a97cc038e639c47b24c380a1e912a7de470bc8aaa77ef8ff85fab88066

              SHA512

              31e91d5f831f65fdf10e46f789f6ad5d52f4aadef7fc18b3d98efbe7f1a9c7c8df3f0a0450ae9a25022cecbb442404d9d26436331b48b0b5e33e48cece6f36bd

            • \ProgramData\DB42.tmp

              Filesize

              14KB

              MD5

              294e9f64cb1642dd89229fff0592856b

              SHA1

              97b148c27f3da29ba7b18d6aee8a0db9102f47c9

              SHA256

              917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

              SHA512

              b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

            • memory/1888-938-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-910-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-956-0x0000000002140000-0x0000000002144000-memory.dmp

              Filesize

              16KB

            • memory/1888-939-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-940-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-941-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-908-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-907-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-906-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-905-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-904-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-903-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-913-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-912-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-911-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-942-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-909-0x00000000021E0000-0x00000000021EA000-memory.dmp

              Filesize

              40KB

            • memory/1888-933-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-934-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-937-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-936-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1888-935-0x0000000002140000-0x000000000214A000-memory.dmp

              Filesize

              40KB

            • memory/1976-0-0x0000000000D30000-0x0000000000D70000-memory.dmp

              Filesize

              256KB

            • memory/2616-871-0x000000007EF20000-0x000000007EF21000-memory.dmp

              Filesize

              4KB

            • memory/2616-900-0x000000007EF40000-0x000000007EF41000-memory.dmp

              Filesize

              4KB

            • memory/2616-901-0x000000007EF60000-0x000000007EF61000-memory.dmp

              Filesize

              4KB

            • memory/2616-870-0x000000007EF80000-0x000000007EF81000-memory.dmp

              Filesize

              4KB

            • memory/2616-867-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

              Filesize

              4KB

            • memory/2616-869-0x00000000023D0000-0x0000000002410000-memory.dmp

              Filesize

              256KB