Resubmissions

19-08-2024 02:08

240819-ckmz8ssapl 10

19-08-2024 01:29

240819-bwmyyazelq 10

Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 01:29

General

  • Target

    2024-08-19_f24e4d221c73ebf1c2fb12d15c13fde9_darkside.exe

  • Size

    145KB

  • MD5

    f24e4d221c73ebf1c2fb12d15c13fde9

  • SHA1

    019ef3cbd70a0c4e3ea5c45ec4afdc28a655ed81

  • SHA256

    4f006379bbd3a2b2611346595ce373595031177d7043200591d81150aefc8ee0

  • SHA512

    1508ebf2cba481eda06707d133b994932688d6d3be6c1373e9e88bf8c36a02331df31dc1a575b6e4ed8a160294c88ae8767115af16af94e51b1589bdeedd1629

  • SSDEEP

    3072:H6glyuxE4GsUPnliByocWepMIO/oULmUHI:H6gDBGpvEByocWeGy6

Malware Config

Signatures

  • Renames multiple (308) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-08-19_f24e4d221c73ebf1c2fb12d15c13fde9_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-08-19_f24e4d221c73ebf1c2fb12d15c13fde9_darkside.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\ProgramData\70DC.tmp
      "C:\ProgramData\70DC.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\70DC.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1640
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:2172

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2257386474-3982792636-3902186748-1000\AAAAAAAAAAA

      Filesize

      129B

      MD5

      afafebce3285f7dea2bbe38aa03f1f66

      SHA1

      16b402ba44590c9f8fad5e908c94a510b08a843a

      SHA256

      64eda8faf1512a83a381c212036fd77f10e22837c6b7d1e267e4baf2b071f21d

      SHA512

      ed32f50106ad3be9387e2f29aace32e24f8a0638d60d9ae64af806f393755bfa82560eb2d68df235cf976c31ac90b5dc169d6942f466470cec43986161c07b53

    • C:\N0IKX538u.README.txt

      Filesize

      19B

      MD5

      7edb66f1ed51a03a8b381c2307756c3c

      SHA1

      60fbdfcefe96843c077b66f7df2f89cbb3bd0312

      SHA256

      0fb417b326d101acbdbb29f1a10c8cfea19b6ce313c17f970ecbfd318c5015dd

      SHA512

      f65dc6c8a1494c267b217f562a6c98fa4b8d7ee9a77127d4062a6fba5e26879b9a4adb5649b3777d26f95ba491f29cde343fc4353e9ef6c8648ed51332a87dff

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      145KB

      MD5

      1d0bf7c7d8dc8e088c3fc1b61a173a49

      SHA1

      a362acb54dae87f32c49c9766fab02148c1784b2

      SHA256

      b5b268d32682ef2e9947c916a6f30b7c78c683fa989645be42db3266336d0151

      SHA512

      acf09992d7723bcca20323d6a45dcc4a149ff25aeb5d2f82f27419c58979a426a8aea1757692262fe66b3539e1b8bcf1c02bddb448fbe0db29d348b8509c1ba0

    • F:\$RECYCLE.BIN\S-1-5-21-2257386474-3982792636-3902186748-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      947ac347c20263808f3847fedecd898f

      SHA1

      e799f64e697168c483cfbaeb712d182e3dc33c3b

      SHA256

      cdbcd4e1ab76f9ec25e30a4173637a1a622d75b889ccfd8b2ca067ce9265c052

      SHA512

      194dd417f0759e51cc510f834e61e4daf627d0546c8ed01769a3105a147b3e3c387f8143a5a739c83c8f07d0e6cf08a980fcf39ac2301d9fbdcb0befdec3abff

    • \ProgramData\70DC.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/1260-842-0x0000000000401000-0x0000000000404000-memory.dmp

      Filesize

      12KB

    • memory/1260-844-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/3000-1-0x0000000000270000-0x00000000002B0000-memory.dmp

      Filesize

      256KB

    • memory/3000-0-0x0000000000270000-0x00000000002B0000-memory.dmp

      Filesize

      256KB