Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 00:45

General

  • Target

    2024-03-13_f28a75de3d39b47c7529146ea4195e6b_darkside.exe

  • Size

    149KB

  • MD5

    f28a75de3d39b47c7529146ea4195e6b

  • SHA1

    0442ba2c8e9f585acbb4ab9f8f99ea84af729e86

  • SHA256

    8732b3934981357a625f425af08731a6bb5fc00f3a957dd4518de98cf84d08d7

  • SHA512

    ab2765f862a5a014a3f31f697fe1915778ab40c40cc25f66cc19c0a3bad546ca867649430a1b398ee48599e74be609d8ea76e52491c3294f507f505d4b3bb4a2

  • SSDEEP

    3072:Z6glyuxE4GsUPnliByocWepTXD5R8yBq/a0vV0:Z6gDBGpvEByocWep1eyaa0vV0

Malware Config

Extracted

Path

C:\z9VLivqzH.README.txt

Family

lockbit

Ransom Note
~~~ LockBit 3.0 the world's fastest ransomware since 2019~~~ >>>> Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. You can obtain information about us on twitter https://twitter.com/hashtag/lockbit?f=live >>>> You need contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait for our answer because we attack many companies. If you do not get an answer in the chat room for a long time, the site does not work and in any other emergency, you can contact us in jabber or tox. Tox ID LockBitSupp: BFDE7C305BA929B06C26CF6EDF44A054E8D35378E7C3A603A15313F285B99E5EED08EC4E3FC4 XMPP (Jabber) Support: [email protected] >>>> Your personal DECRYPTION ID: 99CFA9F060AB07453ABDA924340869D6 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again! >>>> Advertisement Would you like to earn millions of dollars $$$ ? Our company acquire access to networks of various companies, as well as insider information that can help you steal the most valuable data of any company. You can provide us accounting data for the access to any company, for example, login and password to RDP, VPN, corporate email, etc. Open our letter at your email. Launch the provided virus on any computer in your company. You can do it both using your work computer or the computer of any other employee in order to divert suspicion of being in collusion with us. Companies pay us the foreclosure for the decryption of files and prevention of data leak. You can contact us using Tox messenger without registration and SMS https://tox.chat/download.html. Using Tox messenger, we will never know your real name, it means your privacy is guaranteed. If you want to contact us, write in jabber or tox. Tox ID LockBitSupp: BFDE7C305BA929B06C26CF6EDF44A054E8D35378E7C3A603A15313F285B99E5EED08EC4E3FC4 XMPP (Jabber) Support: [email protected] If this contact is expired, and we do not respond you, look for the relevant contact data on our website via Tor or Brave browser
URLs

https://twitter.com/hashtag/lockbit?f=live

https://tox.chat/download.html

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_f28a75de3d39b47c7529146ea4195e6b_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_f28a75de3d39b47c7529146ea4195e6b_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-2727153400-192325109-1870347593-1000\desktop.ini

    Filesize

    129B

    MD5

    6415508a4eace0407d66957910bf121f

    SHA1

    45422a83be67cec21ea199c6fb16489e5007388f

    SHA256

    cb5f355cc32a9c2ebb946d35246bee7bb93e59bb13b23a2926ffb6974e0d29a5

    SHA512

    3bc1623a8703557882bd0a058e87d430bf258c6a9731f171ec7d98428fb30d0b784a80775edef7fe7b6223347dfd626c00b1efab8853e479fe58dc97a8c19fb9

  • C:\z9VLivqzH.README.txt

    Filesize

    2KB

    MD5

    31b33dc2926af4e46899e5bb4568a893

    SHA1

    7098cce13c2430c31f86434dbc7af8f265fdc841

    SHA256

    11e36014dcaa851f35ddd153fb29bfa0f7c2864ef60e6e55ce9884cccc11fe38

    SHA512

    f2bdaa4fcdb39afbb8c7a82ec6ee3121705576a68ea9d56d0096bac73c07eff511606e63f860ebe3224df378a60b224640a3d709486a09d58679648342e3af4a

  • F:\$RECYCLE.BIN\S-1-5-21-2727153400-192325109-1870347593-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    7684b78fd37b870f6d57d39b363d9a15

    SHA1

    7faf010fcc4635faffb3e158a7ce820724842ec6

    SHA256

    3292c118268b5de28e4bdef6550c3310302e2b2927acfbace938d3578dcf0bf1

    SHA512

    97a240280e5f0490445acf88c2532981e5e4ead5b5e58b73efb5cbdb05bd54e01fbc02245a456b1f70246672a1ef31b6ba848954d46c70bfc4f428a2cc5ff95c

  • memory/2612-0-0x0000000001100000-0x0000000001110000-memory.dmp

    Filesize

    64KB

  • memory/2612-1-0x0000000001100000-0x0000000001110000-memory.dmp

    Filesize

    64KB

  • memory/2612-2-0x0000000001100000-0x0000000001110000-memory.dmp

    Filesize

    64KB

  • memory/2612-2605-0x0000000001100000-0x0000000001110000-memory.dmp

    Filesize

    64KB

  • memory/2612-2606-0x0000000001100000-0x0000000001110000-memory.dmp

    Filesize

    64KB

  • memory/2612-2607-0x0000000001100000-0x0000000001110000-memory.dmp

    Filesize

    64KB