Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 15:25

General

  • Target

    2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside.exe

  • Size

    146KB

  • MD5

    b71bd8482d6e872bd867966a1e572ac9

  • SHA1

    926d496eed4f6735999dcac03b9295222ea45dc1

  • SHA256

    f156e0cc550938d59d92fcf7768d5070360d46c80555ed4f972d2af0f4233fdb

  • SHA512

    4392f36b65fe82ce102a0faf55f2fdce4cd8463cf42eab2ca68bcbe3578de4804d5ec475ed2294fc8e7bef9e319af18ee2656dea4b499ff43476f2a8f35d85b6

  • SSDEEP

    3072:x6glyuxE4GsUPnliByocWepqzW0lfCoCufrJikFt1YY:x6gDBGpvEByocWeczXlqIldvYY

Malware Config

Extracted

Path

C:\qcH9iqGVb.README.txt

Family

lockbit

Ransom Note
~~~ LockBit 3.0 the world's fastest ransomware since 2019~~~ >>>> Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. >>>> You need to contact us with your personal DECRYPTION ID: 192C4C26CEA15FFC1C823508BD732856 >>>> To contact us: 1. Download Getsesion https://getsession.org/download 2. Add friend my id: 056f75f9f2a86187593f214d3747e0dd62928ce31e33e7dcb70ca79ab7141b2207 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again!
URLs

https://getsession.org/download

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Renames multiple (339) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-16_b71bd8482d6e872bd867966a1e572ac9_darkside.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\ProgramData\D8E1.tmp
      "C:\ProgramData\D8E1.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\D8E1.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:264
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x14c
    1⤵
      PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini

      Filesize

      129B

      MD5

      1786a42452a0329e3f5a2ac954db20f5

      SHA1

      6429577b1494400dfbd63cad1cd55462b4ac06fd

      SHA256

      2a2d9754c5782984894de87738261d5f9ec0c88c9af8d7555d641a8b57e5b69e

      SHA512

      8bc32191b75d669ee4b7da54e75f1d3e7ddf68f9d2551eadd8fed7d536d9ba76c62254d2d36c4ad9181fadd445bc5f147801ab025f2c998a5edb50bb4c58ed67

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      146KB

      MD5

      26d203c17cd1bfd6f69812ba4af1c895

      SHA1

      31856e4ef2de177937a8b15a95bb971426f52c92

      SHA256

      23763c947b87afa587ff21314bd931398949a53c59aeb8054ce5b06e9717e826

      SHA512

      eb861a5d6b590fa2ed286db7e229ede9468c901559fbd9be54265d57984b34b8a81c86f6b1be44bcf0bf693d932d8def1e0c49b260af5ce54ad71fcdda39be4b

    • C:\qcH9iqGVb.README.txt

      Filesize

      1KB

      MD5

      2a21dd89894ea36584738827ecacc799

      SHA1

      12bba4f6bcdeead2efca32a22402456ccc583ebc

      SHA256

      81d294f23775580bdb0466f8d5756b10cd056f932769a945fa59578b8e4d385d

      SHA512

      4a21667a7e86c5d7c7ea8e4a275d84344c927660677f5527f5813e89c071fcc45ffe41f440f12ce9be4725d844fc9261f32286e66dff728fe87bc1d03b03e3a3

    • F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      3411d571ac5c1ab5bc4778050568e1e3

      SHA1

      230debe652a416673626ae133e11a09d2c7cb1ad

      SHA256

      fbb934c2da146e8bfdf4ca12abfcf05d0e7cad392ff90628ca3357432fc98e9f

      SHA512

      cac360eb243d93bd2570e868318cdb996787ff03f851c22b81dc2da5caf7bc68536132ff70024220c5e1f46e76759e7fc580caf2b10afb43425941a0960cc842

    • \ProgramData\D8E1.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/1748-877-0x000000007EF80000-0x000000007EF81000-memory.dmp

      Filesize

      4KB

    • memory/1748-876-0x00000000021B0000-0x00000000021F0000-memory.dmp

      Filesize

      256KB

    • memory/1748-875-0x000000007EF20000-0x000000007EF21000-memory.dmp

      Filesize

      4KB

    • memory/1748-874-0x00000000021B0000-0x00000000021F0000-memory.dmp

      Filesize

      256KB

    • memory/1748-872-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

      Filesize

      4KB

    • memory/1748-906-0x00000000021B0000-0x00000000021F0000-memory.dmp

      Filesize

      256KB

    • memory/1748-907-0x00000000021B0000-0x00000000021F0000-memory.dmp

      Filesize

      256KB

    • memory/1748-910-0x000000007EF40000-0x000000007EF41000-memory.dmp

      Filesize

      4KB

    • memory/1748-911-0x000000007EF60000-0x000000007EF61000-memory.dmp

      Filesize

      4KB

    • memory/2372-0-0x0000000000910000-0x0000000000950000-memory.dmp

      Filesize

      256KB