Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
01/11/2021, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
5da2a2ebe9959e6ac21683a8950055309eb34544962c02ed564e0deaf83c9477.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
5da2a2ebe9959e6ac21683a8950055309eb34544962c02ed564e0deaf83c9477.exe
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe
Resource
win7-en-20210920
Behavioral task
behavioral4
Sample
98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe
Resource
win10-en-20211014
General
-
Target
98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe
-
Size
700KB
-
MD5
46a1325bb01e37e0ee2d2ba37db257f2
-
SHA1
fde5f666007cdb1fd1dddd2fefbed916992e9e65
-
SHA256
98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63
-
SHA512
2244ad1c7cc1814d0ca2a646ad1d158fef6a269bfcaa327d46400c6ab7edb595b1c47393cfcbb9b15c6f748f50515a4da397733972198453822b03757861ff72
Malware Config
Extracted
C:\Recovery\6e3e77a2-1a56-11ec-8d0f-c222d480bba6\README.txt
darkside
Signatures
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Modifies extensions of user files 14 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File created C:\Users\Admin\Pictures\DisconnectPop.tif.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\DismountSubmit.tiff.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\MountRegister.tif.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\EnableSuspend.png.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File opened for modification C:\Users\Admin\Pictures\InitializeRepair.tiff 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\InitializeRepair.tiff.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\MeasureSelect.raw.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\AssertInstall.tif.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\CompressRestart.tif.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\ExpandRegister.png.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\UnregisterMount.crw.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\DenyUnregister.raw.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File opened for modification C:\Users\Admin\Pictures\DismountSubmit.tiff 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe File created C:\Users\Admin\Pictures\ReadMount.tif.decaf 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1000 1100 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe 31 PID 1100 wrote to memory of 1000 1100 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe 31 PID 1100 wrote to memory of 1000 1100 98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe"C:\Users\Admin\AppData\Local\Temp\98272cada9caf84c31d70fdc3705e95ef73cb4a5c507e2cf3caee1893a7a6f63.exe"1⤵
- Modifies extensions of user files
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\cipher.execipher.exe /w:C:\2⤵PID:1000
-