Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2024, 06:01

General

  • Target

    2024-03-10_1c78cffcde293d1b04741e2cb59f4e3c_darkside.exe

  • Size

    689KB

  • MD5

    1c78cffcde293d1b04741e2cb59f4e3c

  • SHA1

    6aca3d68083d3a2cb867189c84110cbc3f4885af

  • SHA256

    c6a8d8549aa7302474411722212138d97e9c232386463d72f76bf12dbb51cacb

  • SHA512

    41ab4f71161da4d8b5061c3c13b1c503cd03483482d2a02643cdbba06c4e2b7790f1cebecb30cdf7ea734441fe06fe18582fe8a478d464e82559102b6c1b3fde

  • SSDEEP

    6144:RYleXylQX+BVAikPGMk+i/SzrseFM9nTr9h1Bqd1yJZYZp9fqzOo+fveFjS5YD/g:xnQziM9TpmyJZupzvaS5YgzZT

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-10_1c78cffcde293d1b04741e2cb59f4e3c_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-10_1c78cffcde293d1b04741e2cb59f4e3c_darkside.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2312

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~DF4A28.tmp

          Filesize

          689KB

          MD5

          6e92000ea902ff7b42af8262c2bf58b0

          SHA1

          0d2e47df9a02646d66ddded2fe0a13467db15798

          SHA256

          81c3611880d04da59921f79648e8b0c7f4983e5a4b54c4dfe85ef4bc4b4a3b58

          SHA512

          5b05269f4b65cc244d21c29f321479836c37fe77f32b071139776c6b5db41b5f2d6df585e220d2948d74bbd0524328005eefa2a284455610db84bddcda03ad81