Malware Analysis Report

2024-10-16 03:28

Sample ID 211125-r7pjxafebq
Target a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe
SHA256 a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850
Tags
upx darkside ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850

Threat Level: Known bad

The file a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe was found to be: Known bad.

Malicious Activity Summary

upx darkside ransomware

DarkSide

UPX packed file

Modifies extensions of user files

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-11-25 14:50

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-11-25 14:50

Reported

2021-11-25 15:20

Platform

win7-en-20211014

Max time kernel

1800s

Max time network

1563s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

Signatures

DarkSide

ransomware darkside

Modifies extensions of user files

ransomware
Description Indicator Process Target
File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\NewWrite.tiff.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\OpenRead.raw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\ResumeUninstall.png.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\UndoProtect.raw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

C:\Windows\system32\cipher.exe

cipher.exe /w:C:\

Network

N/A

Files

memory/1332-55-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2021-11-25 14:50

Reported

2021-11-25 15:20

Platform

win10-en-20211104

Max time kernel

431s

Max time network

1562s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

Signatures

DarkSide

ransomware darkside

Modifies extensions of user files

ransomware
Description Indicator Process Target
File created C:\Users\Admin\Pictures\ExpandPush.raw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\FormatPing.crw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\SaveCheckpoint.tif.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\SkipSplit.crw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\SwitchStep.raw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\CompleteHide.tif.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\ConvertToCompress.png.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\DismountComplete.crw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

C:\Windows\system32\cipher.exe

cipher.exe /w:C:\

Network

Country Destination Domain Proto
US 52.109.8.20:443 tcp
US 8.8.8.8:53 time.windows.com udp
NL 20.101.57.9:123 time.windows.com udp
US 8.8.8.8:53 sv.symcb.com udp
US 93.184.220.29:80 sv.symcb.com tcp
US 8.8.8.8:53 ts-crl.ws.symantec.com udp
US 93.184.220.29:80 ts-crl.ws.symantec.com tcp

Files

memory/3776-118-0x0000000000000000-mapping.dmp