Malware Analysis Report

2024-10-16 03:29

Sample ID 211125-rx1t7aagg8
Target a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850
SHA256 a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850
Tags
upx darkside ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850

Threat Level: Known bad

The file a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850 was found to be: Known bad.

Malicious Activity Summary

upx darkside ransomware

DarkSide

UPX packed file

Modifies extensions of user files

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2021-11-25 14:35

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2021-11-25 14:35

Reported

2021-11-25 14:37

Platform

win7-en-20211014

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

Signatures

DarkSide

ransomware darkside

Modifies extensions of user files

ransomware
Description Indicator Process Target
File created C:\Users\Admin\Pictures\DenyInvoke.tiff.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\ExitUse.tif.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\GetGroup.tif.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\SkipSelect.raw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\SyncSet.raw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File opened for modification C:\Users\Admin\Pictures\DenyInvoke.tiff C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

C:\Windows\system32\cipher.exe

cipher.exe /w:C:\

Network

N/A

Files

memory/1752-55-0x0000000000000000-mapping.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2021-11-25 14:35

Reported

2021-11-25 14:37

Platform

win10-en-20211104

Max time kernel

124s

Max time network

127s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

Signatures

DarkSide

ransomware darkside

Modifies extensions of user files

ransomware
Description Indicator Process Target
File created C:\Users\Admin\Pictures\SaveOpen.crw.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File opened for modification C:\Users\Admin\Pictures\WatchGrant.tiff C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A
File created C:\Users\Admin\Pictures\WatchGrant.tiff.decaf C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe

"C:\Users\Admin\AppData\Local\Temp\a471fdf6b137a6035b2a2746703cd696089940698fd533860d34e71cc6586850.exe"

C:\Windows\system32\cipher.exe

cipher.exe /w:C:\

Network

Country Destination Domain Proto
US 52.109.8.20:443 tcp
US 8.8.8.8:53 time.windows.com udp
NL 20.101.57.9:123 time.windows.com udp

Files

memory/4372-118-0x0000000000000000-mapping.dmp