Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10-07-2024 23:47

General

  • Target

    2024-07-10_dce3f6e158f2b52da18c994cd8a2ab3a_darkside.exe

  • Size

    145KB

  • MD5

    dce3f6e158f2b52da18c994cd8a2ab3a

  • SHA1

    55f3794996bfede256110c5b21b885727c865e4d

  • SHA256

    b47c02aacbc56df31a533706f45afa945600f1a7d2b3ed8831cef0581104c177

  • SHA512

    2b9484bc41ed41cc33e5cbf11451f4c7f9f2c49ff7066d3e9a1c1eadc69488ce53fcb52bde2aac190d1db38a023b3426724bfb11c440d2c94d84048e92a070af

  • SSDEEP

    3072:PqJogYkcSNm9V7DqOyY4lX7u1f8CNixMKT:Pq2kc4m9tDtK

Malware Config

Signatures

  • Renames multiple (364) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-10_dce3f6e158f2b52da18c994cd8a2ab3a_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-10_dce3f6e158f2b52da18c994cd8a2ab3a_darkside.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\ProgramData\E61B.tmp
      "C:\ProgramData\E61B.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\E61B.tmp >> NUL
        3⤵
          PID:1776
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x148
      1⤵
        PID:2332

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-3450744190-3404161390-554719085-1000\desktop.ini

        Filesize

        129B

        MD5

        ef3ccdf698f6fb9f66e4612e0f2edb29

        SHA1

        4a4d8079a256d040a315b03ac02b7246f513ca26

        SHA256

        81b04df6dfc03e571f7de9de1aca2b36f989b9e108bf6c8b15c0c95ec5a2e8f9

        SHA512

        f481204ad01c5946d537b088db43bf39008a94ec480b20341e77780bf0b490e0b79ff675031e7e7ff222f8f305cdd214fc7b6190894d8ce3f21003b3dd6db2dc

      • C:\FpDmOeve6.README.txt

        Filesize

        316B

        MD5

        200e7573a38b7009cca5db5782830bc7

        SHA1

        556f4659b617e3fd5df33568303c5540e564d8d1

        SHA256

        e99d23424be8a242e30f3ef5b4727a07de004eaab84da4e68233235ca2f533ce

        SHA512

        4857a853e62bc6772bbaa0707fde2f3030cd02a4a5e26493b2227f2b391a432f635f7481cb5e4914c061088b98622bf5db09664030b0a708ffd63785bda62521

      • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

        Filesize

        145KB

        MD5

        815532a20a110a3e6c95e4b5bdc35023

        SHA1

        5968c78acac848026395e938a9483295d858fa18

        SHA256

        03d8082618c35ef2c80e8fbaa1e822f6290e39df6772269002f0136bc3450e04

        SHA512

        f7e0c6da60b93ca173c17436315391e170c90721254f21503f3966d1b871c4b0e2465bdbb3ff3e37523836e491af3b6b050f21d9c44b476aaace4b8101f17adc

      • F:\$RECYCLE.BIN\S-1-5-21-3450744190-3404161390-554719085-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        417338dc0cea4950bbc096952de2c5f9

        SHA1

        9d6adee7c6b39e42ed2acdbf04a7e3f62fbdd7f2

        SHA256

        0e77ab62d45b09a96632ae3aa5998991527e4ac3372e7fe01ed098b71b90d529

        SHA512

        88aa3ca7a350eb45f8a43b05410a01175ce437cb062e5f6d91aa0168e865849e01734758f654ca4676e08d35661a59b834aed23bb2ac0a1cf28394e501425256

      • \ProgramData\E61B.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • memory/1748-894-0x0000000000401000-0x0000000000404000-memory.dmp

        Filesize

        12KB

      • memory/1748-896-0x0000000000400000-0x0000000000407000-memory.dmp

        Filesize

        28KB

      • memory/2368-0-0x0000000000DC0000-0x0000000000E00000-memory.dmp

        Filesize

        256KB