Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 22:32

General

  • Target

    2024-03-13_ac6a7885e55155b6025f45bf90d5af64_darkside.exe

  • Size

    149KB

  • MD5

    ac6a7885e55155b6025f45bf90d5af64

  • SHA1

    08d5edf13c34b78c68c6a01e1f2346baa9de5d54

  • SHA256

    a779818597f3d64aac07f3db86bfa6019bf84069691e581f9f2d1b5a0c15daf0

  • SHA512

    1d13fb7f5808392883e9644b91d4423765f3ac063ade2d511c85302fb9c9ebe5d2819f908b2223bf20f49b3162879bef60f50980d70b7fc4f90d8c1b5be47e51

  • SSDEEP

    3072:S6glyuxE4GsUPnliByocWepBoOoWPuqMLWlYcaS:S6gDBGpvEByocWejotfqMClY0

Malware Config

Extracted

Path

C:\LPJKYjRBM.README.txt

Family

lockbit

Ransom Note
~~~ LockBit 3.0 the world's fastest ransomware since 2019~~~ >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. You can obtain information about us on twitter https://twitter.com/hashtag/lockbit?f=live >>>> You need contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait for our answer because we attack many companies. If you do not get an answer in the chat room for a long time, the site does not work and in any other emergency, you can contact us in mail or tox. Tox ID LockBitSupp: 0DF6BDFBF6459753325943FAE72DF57F396F226FE7B9C1645D98750AAB01DF3CAFF6C13CBD52 mail Support: [email protected] >>>> Your personal DECRYPTION ID: 419A343AEF3FCBF85DD317A8CF654933 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again! >>>> Advertisement Would you like to earn millions of dollars $$$ ? Our company acquire access to networks of various companies, as well as insider information that can help you steal the most valuable data of any company. You can provide us accounting data for the access to any company, for example, login and password to RDP, VPN, corporate email, etc. Open our letter at your email. Launch the provided virus on any computer in your company. You can do it both using your work computer or the computer of any other employee in order to divert suspicion of being in collusion with us. Companies pay us the foreclosure for the decryption of files and prevention of data leak. You can contact us using Tox messenger without registration and SMS https://tox.chat/download.html. Using Tox messenger, we will never know your real name, it means your privacy is guaranteed. If you want to contact us, write in mail or tox. Tox ID LockBitSupp: 0DF6BDFBF6459753325943FAE72DF57F396F226FE7B9C1645D98750AAB01DF3CAFF6C13CBD52 mail Support: [email protected]
URLs

https://twitter.com/hashtag/lockbit?f=live

https://tox.chat/download.html

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Renames multiple (348) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_ac6a7885e55155b6025f45bf90d5af64_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_ac6a7885e55155b6025f45bf90d5af64_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1660
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:2020

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2721934792-624042501-2768869379-1000\desktop.ini

      Filesize

      129B

      MD5

      709c0ca5dfd17783930a876dfcee57f3

      SHA1

      0d41d2faf715c1eb14cc7157f197a5aa95cdeeee

      SHA256

      a256930ec2ea1030c4b9d6937c744710b0929ff9716f9f376771a22b677f0bbc

      SHA512

      74435de060fd0f18e4afab63877a817732dcd2c615d6c23535cd23eb94a023eb09c14311d126fca80a90670a0010a0bd204c2bc528d1959d3ba81871d719f674

    • C:\LPJKYjRBM.README.txt

      Filesize

      2KB

      MD5

      29fb3b15492cd58b143f7f2d78a40064

      SHA1

      5e791c9dedfbcd72eb3e489f2dfe548d61a72909

      SHA256

      1a77cbf05f015ebf999ac303c5258a2dc1b324dba47cdb5f63b899595a1c7fff

      SHA512

      8b6adca04d5939d049016ad60ed184188b1fbed835070896e3094daa29ed3137839d96d37f69840db867c3896f7574aca66b4cec8b41be9a66d59214589ac27b

    • F:\$RECYCLE.BIN\S-1-5-21-2721934792-624042501-2768869379-1000\QQQQQQQQQQQ

      Filesize

      129B

      MD5

      4cc96dd055de917f324fcfbedf42ac8d

      SHA1

      4ccfa411efe3b328a4c570693ce3679cbaffc38a

      SHA256

      f7285d63df526bf8dbcac612d71635397403252e219f0c5540cc466c19a7cfed

      SHA512

      29b567271999aa733c964169658017afbc4eeb62a8c447f34e60aab8fc82b40e15d7a2edb6601cc91d236fa3c675ee251b36763ace120e9e2d899177cf41f1f1

    • memory/1660-0-0x0000000002420000-0x0000000002460000-memory.dmp

      Filesize

      256KB