Analysis
-
max time kernel
147s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 07:52
Behavioral task
behavioral1
Sample
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe
-
Size
146KB
-
MD5
9cdb2bbdd9de55d1f79c4999dbe51655
-
SHA1
f6112548b684898fa2b0bbe4e1cd172455600cb0
-
SHA256
a9529a8df8a4e970e663bdd3e279303461d3bd4d952fa8a435b30bd70f130e91
-
SHA512
2850a869b0119b4bcb8c921f0b7e685f4e35a76830f4c05995b8c5535d8b0c3cf3eca4e7b878640b951e7d73e32c09d942ce40e05478d6e24a2f5ea958d59f35
-
SSDEEP
1536:VzICS4AwwRlcz5AxE4vGP1iU8KnliIs3iocZMgkGJp1Fhheye7Shd8l/Sx2G1oa:26glyuxE4GsUPnliByocWepnexSsl82
Malware Config
Signatures
-
Renames multiple (619) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BE21.tmpdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation BE21.tmp -
Deletes itself 1 IoCs
Processes:
BE21.tmppid Process 4952 BE21.tmp -
Executes dropped EXE 1 IoCs
Processes:
BE21.tmppid Process 4952 BE21.tmp -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exedescription ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4182098368-2521458979-3782681353-1000\desktop.ini 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
Processes:
splwow64.exeprintfilterpipelinesvc.exedescription ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL splwow64.exe File created C:\Windows\system32\spool\PRINTERS\PPrp60i5srie77soufj000rhyw.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPmj3st9cat6pph7zl4mf7rd0vc.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPffjpi_5wap0cegdj3mdcfr0cc.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\VDDUnR1a6.bmp" 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\VDDUnR1a6.bmp" 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exeBE21.tmppid Process 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 4952 BE21.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exeBE21.tmpcmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BE21.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ONENOTE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
ONENOTE.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Modifies Control Panel 2 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop\WallpaperStyle = "10" 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe -
Modifies registry class 5 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VDDUnR1a6\DefaultIcon 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VDDUnR1a6 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VDDUnR1a6\DefaultIcon\ = "C:\\ProgramData\\VDDUnR1a6.ico" 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.VDDUnR1a6 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.VDDUnR1a6\ = "VDDUnR1a6" 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exepid Process 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe -
Suspicious behavior: RenamesItself 26 IoCs
Processes:
BE21.tmppid Process 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp 4952 BE21.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exedescription pid Process Token: SeAssignPrimaryTokenPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeDebugPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: 36 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeImpersonatePrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeIncBasePriorityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeIncreaseQuotaPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: 33 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeManageVolumePrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeProfSingleProcessPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeRestorePrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSystemProfilePrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeTakeOwnershipPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeShutdownPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeDebugPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeBackupPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe Token: SeSecurityPrivilege 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
ONENOTE.EXEpid Process 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE 5116 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exeprintfilterpipelinesvc.exeBE21.tmpdescription pid Process procid_target PID 2388 wrote to memory of 3832 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 92 PID 2388 wrote to memory of 3832 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 92 PID 3148 wrote to memory of 5116 3148 printfilterpipelinesvc.exe 97 PID 3148 wrote to memory of 5116 3148 printfilterpipelinesvc.exe 97 PID 2388 wrote to memory of 4952 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 98 PID 2388 wrote to memory of 4952 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 98 PID 2388 wrote to memory of 4952 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 98 PID 2388 wrote to memory of 4952 2388 2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe 98 PID 4952 wrote to memory of 2136 4952 BE21.tmp 99 PID 4952 wrote to memory of 2136 4952 BE21.tmp 99 PID 4952 wrote to memory of 2136 4952 BE21.tmp 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe"C:\Users\Admin\AppData\Local\Temp\2024-09-14_9cdb2bbdd9de55d1f79c4999dbe51655_darkside.exe"1⤵
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
- Drops file in System32 directory
PID:3832
-
-
C:\ProgramData\BE21.tmp"C:\ProgramData\BE21.tmp"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\BE21.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1168
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{F6DF9DBF-70F7-4D1A-9EC8-A73113A43992}.xps" 1337077396034500002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:5116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5924fdfac1899dade7db74b0e3bc6fd3e
SHA1d94ff03b790aba8a09fee5c40f86c1d0bd20216d
SHA2564aee79d07675fcfc2d94899f246de41694fdb8e23b3f71ae3d0ff393bf527289
SHA5121d580cf23b22560db51e1fb9be6f5d7f3c476eed933899ab7cc2ff0a21c733d7660b5edc8b48133e06b40ea0282e59d2c7b7dabf75694c2e1051c23f5a054ca3
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
146KB
MD55a6d8c342ee57e64492d87a4961a3e2c
SHA1c77d30ac1612f727d76beef8ab97897b9218c018
SHA25697cf0ef5f3600dfebe6686591794f9ab4116bcd9ce96a47f2f5eeb431135d3be
SHA512807426e938ed802e7e882c330179f0bd4d627076bec50a2843470fc3a300fdcad905a83e3774af4430b73def234a9839f157510923455384699bd4820625bfc9
-
Filesize
4KB
MD56cafef5a2e98f726c28a1e704f90c707
SHA17c4ea3487146664f795aa829e1c28f84e10b756b
SHA25680d4715b7d12634b616c9a6bf6ea78c25903c5944eaae13aa21b5f322444d48b
SHA512278bae34b6e765f68b170e41bd97c0457eee1930e33a96bdf9eb557343808106ddd3ce8edd63e3a85d081760d01815f1d1377f8d631e200cdb1623da935dcf2e
-
Filesize
4KB
MD5e04b5140c17bcb7de2c2bdf0a815473d
SHA130db571c71b5a7acd01452d7b39a9116c0baad6c
SHA2569089ca31ecb432fe62d3ebed0c544b06dc32617b0f6e277cc8599c4a3dea47aa
SHA5121f70db043cda1799cd17c66637f569cd0b69f57db22579a3d837d32dc2543c525f65f59abda8a9d0a4486ffa87967f03cc7acfc3b1bae4443f79c97368d83a10
-
Filesize
343B
MD572b1ffaeb7de456483f491ecceadb088
SHA1ee1953abc295245ab01f35a4a823883826bf2b41
SHA256eb892eac9899b995047733bb17acd4945eb42b7b49f2ee8ad52b8026bc0297a7
SHA512c0e7cad617cf1490bb25fc47936edc3ae164b190ed34f2d2a50e7e84ce6e0d6712a6ba9ab351cca1589266078326a00317516c53fecf96f20eaefe15e92ce445
-
Filesize
129B
MD537a66afd2c9206bcf5d8b3dc1acb021b
SHA16d9841d60ba8e3b762149bdf5274670e45c41462
SHA25646c6ebdb82cd0681902dd53a690c46907351cb6ce646a55a2052c4cf325d7924
SHA512d8ef48ac2c5b6a4f2f0dfb5c8c4d4dda55379b9c85be5959465ce61cf0d45c047abf673b49ea86919644cafa19149247229410bb38151ebe8a77a612771dde70