Analysis
-
max time kernel
114s -
max time network
40s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-12-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe
Resource
win10v2004-20221111-en
General
-
Target
fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe
-
Size
1.5MB
-
MD5
60ed30bea0f9e2db5cc1f45241c7473c
-
SHA1
62b33edc9682bc780bc68d34ae7b19eaf429e42d
-
SHA256
fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6
-
SHA512
e746f0e3e37bc1c8d8a30f9e9e01cb0ab3d95e0338a1cfde78f5442b5492c8427addf0e732264fd3b4d775b2c148ba336b0269d4e194a816a97e1bebc57b7802
-
SSDEEP
49152:Dn3kKc0rJdjgqsLqf3ZfM0Pa5kLLcatsXkjbGDGe0VM:D3k1nkLiDxL
Malware Config
Extracted
C:\Restore-My-Files.txt
darkylock
1E6cvG6iEbufvYspsDa3XQ3WJgEMvRTm9i
Signatures
-
DarkyLock
Ransomware family first seen in July 2022.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 3 IoCs
Processes:
E_WIN.EXEPUTTY.EXEpid process 1284 E_WIN.EXE 1256 PUTTY.EXE 1188 -
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
E_WIN.EXEdescription ioc process File opened for modification C:\Users\Admin\Pictures\MergeSearch.crw.darky E_WIN.EXE File renamed C:\Users\Admin\Pictures\RegisterMerge.png => C:\Users\Admin\Pictures\RegisterMerge.png.darky E_WIN.EXE File renamed C:\Users\Admin\Pictures\DismountEnter.tif => C:\Users\Admin\Pictures\DismountEnter.tif.darky E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\DismountEnter.tif.darky E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\LimitMeasure.png.darky E_WIN.EXE File renamed C:\Users\Admin\Pictures\MeasureClose.crw => C:\Users\Admin\Pictures\MeasureClose.crw.darky E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\MeasureClose.crw.darky E_WIN.EXE File renamed C:\Users\Admin\Pictures\MergeSearch.crw => C:\Users\Admin\Pictures\MergeSearch.crw.darky E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\RegisterMerge.png.darky E_WIN.EXE File renamed C:\Users\Admin\Pictures\ConvertToHide.png => C:\Users\Admin\Pictures\ConvertToHide.png.darky E_WIN.EXE File opened for modification C:\Users\Admin\Pictures\ConvertToHide.png.darky E_WIN.EXE File renamed C:\Users\Admin\Pictures\LimitMeasure.png => C:\Users\Admin\Pictures\LimitMeasure.png.darky E_WIN.EXE -
Loads dropped DLL 4 IoCs
Processes:
fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exepid process 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
E_WIN.EXEdescription ioc process File opened (read-only) \??\H: E_WIN.EXE File opened (read-only) \??\J: E_WIN.EXE File opened (read-only) \??\Q: E_WIN.EXE File opened (read-only) \??\E: E_WIN.EXE File opened (read-only) \??\G: E_WIN.EXE File opened (read-only) \??\F: E_WIN.EXE File opened (read-only) \??\M: E_WIN.EXE File opened (read-only) \??\Y: E_WIN.EXE File opened (read-only) \??\I: E_WIN.EXE File opened (read-only) \??\O: E_WIN.EXE File opened (read-only) \??\K: E_WIN.EXE File opened (read-only) \??\Z: E_WIN.EXE File opened (read-only) \??\X: E_WIN.EXE File opened (read-only) \??\B: E_WIN.EXE File opened (read-only) \??\N: E_WIN.EXE File opened (read-only) \??\R: E_WIN.EXE File opened (read-only) \??\U: E_WIN.EXE File opened (read-only) \??\S: E_WIN.EXE File opened (read-only) \??\A: E_WIN.EXE File opened (read-only) \??\L: E_WIN.EXE File opened (read-only) \??\V: E_WIN.EXE File opened (read-only) \??\W: E_WIN.EXE File opened (read-only) \??\T: E_WIN.EXE File opened (read-only) \??\P: E_WIN.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 980 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
E_WIN.EXEpid process 1284 E_WIN.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
PUTTY.EXEpid process 1256 PUTTY.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1124 vssvc.exe Token: SeRestorePrivilege 1124 vssvc.exe Token: SeAuditPrivilege 1124 vssvc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exeE_WIN.EXEcmd.exedescription pid process target process PID 1348 wrote to memory of 1284 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe E_WIN.EXE PID 1348 wrote to memory of 1284 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe E_WIN.EXE PID 1348 wrote to memory of 1284 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe E_WIN.EXE PID 1348 wrote to memory of 1284 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe E_WIN.EXE PID 1348 wrote to memory of 1256 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe PUTTY.EXE PID 1348 wrote to memory of 1256 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe PUTTY.EXE PID 1348 wrote to memory of 1256 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe PUTTY.EXE PID 1348 wrote to memory of 1256 1348 fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe PUTTY.EXE PID 1284 wrote to memory of 1928 1284 E_WIN.EXE cmd.exe PID 1284 wrote to memory of 1928 1284 E_WIN.EXE cmd.exe PID 1284 wrote to memory of 1928 1284 E_WIN.EXE cmd.exe PID 1284 wrote to memory of 1928 1284 E_WIN.EXE cmd.exe PID 1928 wrote to memory of 980 1928 cmd.exe vssadmin.exe PID 1928 wrote to memory of 980 1928 cmd.exe vssadmin.exe PID 1928 wrote to memory of 980 1928 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe"C:\Users\Admin\AppData\Local\Temp\fc28d2eaee1fd3416fe3e0cd4669df3ac178c577e3a8c386b1c34c3146afb8d6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\E_WIN.EXE"C:\Users\Admin\AppData\Local\Temp\E_WIN.EXE"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet3⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PUTTY.EXE"C:\Users\Admin\AppData\Local\Temp\PUTTY.EXE"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:1256
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD57cdc8057b3fe13b069b8db93fdde1764
SHA18ddd3c69fe3935e4903a2b397bc6f0de772a1bcb
SHA256393a7a313548a4edc025fb47c6c8e614ecc2b41db880ecb59f20cf238e9a864c
SHA5127a7778b03a681bad08722019d27c2ca56609cbe6ec6e976b2d08e402b7ec5f2c7ad7d935632c0958b15b42d3dd066b1bd03707a778d77592a29b92adae684801
-
Filesize
1.4MB
MD5e32f72e15f78347c51c4ca1b2847f667
SHA1de8b253c8aee745fdb082fec5ad0618c2e4cdb92
SHA256341cb4515476007153b7f17212f5e4476852837a031efedd5a4adea723c0bcbe
SHA5125e920453f6fb39b6da4020e803e94b997a4bbc71d5455d0717cea6673864dadc19d66971af9d2ce835b080da41b800e90778384c7799a6f9ac15a840cf4977e5
-
Filesize
92KB
MD57cdc8057b3fe13b069b8db93fdde1764
SHA18ddd3c69fe3935e4903a2b397bc6f0de772a1bcb
SHA256393a7a313548a4edc025fb47c6c8e614ecc2b41db880ecb59f20cf238e9a864c
SHA5127a7778b03a681bad08722019d27c2ca56609cbe6ec6e976b2d08e402b7ec5f2c7ad7d935632c0958b15b42d3dd066b1bd03707a778d77592a29b92adae684801
-
Filesize
92KB
MD57cdc8057b3fe13b069b8db93fdde1764
SHA18ddd3c69fe3935e4903a2b397bc6f0de772a1bcb
SHA256393a7a313548a4edc025fb47c6c8e614ecc2b41db880ecb59f20cf238e9a864c
SHA5127a7778b03a681bad08722019d27c2ca56609cbe6ec6e976b2d08e402b7ec5f2c7ad7d935632c0958b15b42d3dd066b1bd03707a778d77592a29b92adae684801
-
Filesize
1.4MB
MD5e32f72e15f78347c51c4ca1b2847f667
SHA1de8b253c8aee745fdb082fec5ad0618c2e4cdb92
SHA256341cb4515476007153b7f17212f5e4476852837a031efedd5a4adea723c0bcbe
SHA5125e920453f6fb39b6da4020e803e94b997a4bbc71d5455d0717cea6673864dadc19d66971af9d2ce835b080da41b800e90778384c7799a6f9ac15a840cf4977e5
-
Filesize
1.4MB
MD5e32f72e15f78347c51c4ca1b2847f667
SHA1de8b253c8aee745fdb082fec5ad0618c2e4cdb92
SHA256341cb4515476007153b7f17212f5e4476852837a031efedd5a4adea723c0bcbe
SHA5125e920453f6fb39b6da4020e803e94b997a4bbc71d5455d0717cea6673864dadc19d66971af9d2ce835b080da41b800e90778384c7799a6f9ac15a840cf4977e5
-
Filesize
1.4MB
MD5e32f72e15f78347c51c4ca1b2847f667
SHA1de8b253c8aee745fdb082fec5ad0618c2e4cdb92
SHA256341cb4515476007153b7f17212f5e4476852837a031efedd5a4adea723c0bcbe
SHA5125e920453f6fb39b6da4020e803e94b997a4bbc71d5455d0717cea6673864dadc19d66971af9d2ce835b080da41b800e90778384c7799a6f9ac15a840cf4977e5