Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 06:01

General

  • Target

    2024-03-10_1c78cffcde293d1b04741e2cb59f4e3c_darkside.exe

  • Size

    689KB

  • MD5

    1c78cffcde293d1b04741e2cb59f4e3c

  • SHA1

    6aca3d68083d3a2cb867189c84110cbc3f4885af

  • SHA256

    c6a8d8549aa7302474411722212138d97e9c232386463d72f76bf12dbb51cacb

  • SHA512

    41ab4f71161da4d8b5061c3c13b1c503cd03483482d2a02643cdbba06c4e2b7790f1cebecb30cdf7ea734441fe06fe18582fe8a478d464e82559102b6c1b3fde

  • SSDEEP

    6144:RYleXylQX+BVAikPGMk+i/SzrseFM9nTr9h1Bqd1yJZYZp9fqzOo+fveFjS5YD/g:xnQziM9TpmyJZupzvaS5YgzZT

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_1c78cffcde293d1b04741e2cb59f4e3c_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_1c78cffcde293d1b04741e2cb59f4e3c_darkside.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2696

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RCX345A.tmp

    Filesize

    689KB

    MD5

    6e92000ea902ff7b42af8262c2bf58b0

    SHA1

    0d2e47df9a02646d66ddded2fe0a13467db15798

    SHA256

    81c3611880d04da59921f79648e8b0c7f4983e5a4b54c4dfe85ef4bc4b4a3b58

    SHA512

    5b05269f4b65cc244d21c29f321479836c37fe77f32b071139776c6b5db41b5f2d6df585e220d2948d74bbd0524328005eefa2a284455610db84bddcda03ad81