Analysis

  • max time kernel
    126s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 17:33

General

  • Target

    2024-03-13_66b3e535355102fd0cede6506739e474_darkside.exe

  • Size

    147KB

  • MD5

    66b3e535355102fd0cede6506739e474

  • SHA1

    5a20c4d8bbb2495c817c92cfa060a6a235e6ed36

  • SHA256

    9b3cd385077933c2a72cba58d23dcde77852818c3ce1a361baa5c6bbd915b82f

  • SHA512

    f11bd1ed1f2f601ed5db353ff2f85982b3218e3a60f6d58c8f5f5a23df7560fce8fd67da37fe7ef6bc31de2883eb17c2389a1195820968562740a0e46c1569e6

  • SSDEEP

    3072:T6glyuxE4GsUPnliByocWepjUeRBGYENO6g:T6gDBGpvEByocWexUeR0Y2N

Malware Config

Extracted

Path

C:\NupqqeiS5.README.txt

Ransom Note
What happens? Your network is encrypted, and currently not operational. e need only money, after payment we wil1 give you a decryptor for the entire network and you wil1 restore al1 the data. >>>> What data stolen? From your network was stolen sensitive data. If you do not contact us we wil1 publish al1 your data in our blog and wil1 send it to the biggest mass media. >>>>What guarantees?We are not a politically motivated group and we do not need anything otherthan your money.If you pay, we will provide you the programs for decryption and we will delete your data.If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goalsWe always keep our promises. >>>>Pay ransom amount contact Email:[email protected] >>>>Payment cryptocurrency address USDT-TRC20 >>>>TTpEpsPpRH5KSWyqfK1KEvsrJSYKcjbxJ9 >>>>payment is completed, send the payment photo to Email: [email protected] >>>>payment is completed Send via email we will provide you the programs Sometimes you will need to wait for our answer because we attack many companies. we will provide you the programs Warning! Recovery recormnendations. We strongly recommend you to do not MODIFY or REPAIR your files, that wil1 damage them
Emails

Signatures

  • Renames multiple (579) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-13_66b3e535355102fd0cede6506739e474_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-13_66b3e535355102fd0cede6506739e474_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:3168
    • C:\ProgramData\8B88.tmp
      "C:\ProgramData\8B88.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\8B88.tmp >> NUL
        3⤵
          PID:1664
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:3184
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{5D406187-31C6-4183-83E1-734BB85DB859}.xps" 133548247971320000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:2496

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-983155329-280873152-1838004294-1000\GGGGGGGGGGG

        Filesize

        129B

        MD5

        c5a51ecac1fe2b0bcaffd5b4500bbd85

        SHA1

        7040dd609f5541e72b06dd682d1040f97c30ae56

        SHA256

        6b27efc22de613a15c72dd80a03cb85ed394799915c1e65df42c2b6f97e4f55b

        SHA512

        98a27a50a52dca6e212fd8decb3710255d6b16b38c33d9ea4bfb0f400180fd0e8c13ed582d3d64efb57a5f023cf7854903be7d7ccd614a4ba3d4a25ce24beb88

      • C:\NupqqeiS5.README.txt

        Filesize

        1KB

        MD5

        fb07c785132ffb451b7865b5f8be8793

        SHA1

        6ef563addf7aa1bc0a99b70a621bd7ba430a9412

        SHA256

        369475944802faa69d76362094571070a549f9153e29cf5d54e5fd34e36ca0bd

        SHA512

        92f1dadc9de8a3dd1aee9b5310b66ca9d98b26e587cf298e8967995fb2974a842c57e4c1d3458575a1890997cb62151ebbfce679c520f9868ec2d6ffa022f8fc

      • C:\ProgramData\8B88.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

        Filesize

        147KB

        MD5

        efce452d69e6ffcfd5eccc5db3b68344

        SHA1

        eca01aab9ff22bb85acb893ad74a7bb3292811d9

        SHA256

        ca1f05b947b40db800463bb6635b8a04b2d3525668f7454b4a8c63df42000fcb

        SHA512

        d26d925ec5f878044041d4a49926828da9d43078b56c641dc73c5ca9f7747c08e99773042f2f0ea7b9a664ded3ef800f436c0fd163c30877c77af1b9e91774f8

      • C:\Users\Admin\AppData\Local\Temp\{32614196-314B-426B-88C8-3A532A41AF54}

        Filesize

        4KB

        MD5

        c41baea6784546eee8bd713bf1945a02

        SHA1

        6194c32db6cdca0a87ea90d9934d3914e758f1a9

        SHA256

        fbec759ab01c14f3890fffaccc219e144e4d2b0fcbb2faf678bae70553ea813a

        SHA512

        960bfb4fc1137a9944094d21e71d9d270d9347815418c40cf657ad4ab03f9a5591418d3afd0631eb416d8ff869f485e41a51bbbc7fec1797ee2e5fcc00c4cb97

      • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

        Filesize

        4KB

        MD5

        339ae20457a4d7856c69b65096a39df9

        SHA1

        85ee28a115d8a431767305d0059f0c9d8f726209

        SHA256

        0d5f1aba7d2329bc69271a0de49c995c4693e5f7f9facec790787329c6ef33b6

        SHA512

        cc291e99dcc5b9a7fb5f0f0bd7ad6935c69126e918b23d8814f6d5ab32bc47377e3fbabc81adb6336aed40c0208a6c1536c5d6e68fd5ca4e6921b2c5d1efa4dc

      • F:\$RECYCLE.BIN\S-1-5-21-983155329-280873152-1838004294-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        a08dffe66a3c954418b270007104dcc5

        SHA1

        c24ad9e8583e637e15054cce6cf5e1812be086d8

        SHA256

        282fe4450e53d463fe5a4c3472ea8a6317514503c944f2be923a1c4fca5a8a02

        SHA512

        3f972f721900a6aa6e90f2b161f3bb4baf4ae9d818e8a7fc5d056815c67d980f0b83837dbaaed8f5d4d9f12325b2f17a16e459b4248e534e24ce848fbe178d1f

      • memory/1160-2775-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/1160-2776-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/1160-2778-0x000000007FE20000-0x000000007FE21000-memory.dmp

        Filesize

        4KB

      • memory/1160-2745-0x000000007FE40000-0x000000007FE41000-memory.dmp

        Filesize

        4KB

      • memory/1160-2780-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

        Filesize

        4KB

      • memory/1792-1-0x0000000002960000-0x0000000002970000-memory.dmp

        Filesize

        64KB

      • memory/1792-0-0x0000000002960000-0x0000000002970000-memory.dmp

        Filesize

        64KB

      • memory/2496-2786-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2793-0x00007FF9CB4B0000-0x00007FF9CB4C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2783-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2782-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2784-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2785-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2779-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2787-0x00007FF9CB4B0000-0x00007FF9CB4C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2788-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2789-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2790-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2791-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2794-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2781-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2792-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2795-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2796-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2797-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2798-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2799-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2800-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2801-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2746-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2777-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

        Filesize

        64KB

      • memory/2496-2823-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB

      • memory/2496-2824-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

        Filesize

        2.0MB