Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-11-2024 01:05

General

  • Target

    2024-11-15_926a2354fc5ad73582eb89b5e07fe584_darkside.exe

  • Size

    146KB

  • MD5

    926a2354fc5ad73582eb89b5e07fe584

  • SHA1

    f86cf3c2f92a51de9c05325b55bb509cb2ae9473

  • SHA256

    13d491eb547934d35ddca196341067007134568e591751994cd4f4057e0718ad

  • SHA512

    c8972c2144b7dff9a19a5ddc84135896afd03172c9fca5bef47367d11236c4ab068b6aa0183b3200fae8a54fae87f77e8c3253613ce13b932d03c59774785b2d

  • SSDEEP

    1536:YzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDRwEWZjirMqOpdLA33Uyz:HqJogYkcSNm9V7DRwEWZWIqOzL63T

Malware Config

Extracted

Path

C:\OYJFoF4Sh.README.txt

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation. More than a year ago, world experts recognized the impossibility of deciphering by any means except the original decoder. No decryption software is available in the public. Antiviruse companies, researchers, IT specialists, and no other persons cant help you decrypt the data. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions.Send 2 different random files and you will get it decrypted. It can be from different computers on your network to be sure that one key decrypts everything. 2 files we unlock for free To get info (decrypt your files) contact us at telegram first . if you don't get answer in 24 hours then write us a email Contact information : Mail 1 : [email protected] Telegram: https://t.me/Datacentric_Support You will receive btc address for payment in the reply letter No system is safe!
URLs

https://t.me/Datacentric_Support

Signatures

  • Renames multiple (7756) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-15_926a2354fc5ad73582eb89b5e07fe584_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-15_926a2354fc5ad73582eb89b5e07fe584_darkside.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\ProgramData\FE7B.tmp
      "C:\ProgramData\FE7B.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\FE7B.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:908
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:2364

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini

      Filesize

      129B

      MD5

      3949e2c565874738b9c7d16000ddc0ee

      SHA1

      239b12484fa8b0d09c4a57c6325eb8c9a451e55d

      SHA256

      c03c692df97b064e4f68208627f6fae92b1a8386a32d9f335e9803f87d0f1d3f

      SHA512

      4268eadd4828e8e797aed4787336a6db774607a24cd9cf35ee0f0a3c1e8b8f4a06b8c54ec382ec518ff7d28e88c2ea0c63757c6adcdc2dd53e190e3066583f5c

    • C:\OYJFoF4Sh.README.txt

      Filesize

      1KB

      MD5

      d81ed3fae590b0ac64563084575b10fa

      SHA1

      c08b5f597885809c9f2a8968d2e0afdfe25b10d5

      SHA256

      c28e4efdf3c669930558d09a8cc12aa6c8de37d9b3c9ef1db840ccd5129cf881

      SHA512

      7c0d6b14ca2513aa2ef614c2c3b7e703064fe28ae6617bbfa1f0ca136a47a04ec639b19e270250268088f12b6c316c50d2d5d26dcc64d67b40b602acf72f3025

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      146KB

      MD5

      33b9bc8ffabff764b4eba9919d9f06bd

      SHA1

      96d7801a250f0618ab149c6fa8451224466f0a54

      SHA256

      ad582ede5d9adfd1138a047bcf26f99ba42757bafc8ec7fb76eac18e2294accb

      SHA512

      5022812398a03d6c537169be18b2ebb2d118114a3f686ce137ecfd82a215722360ed88f881242c1257de57e8798deaeda77fe8eaae61321f90a92a95ad5e0471

    • F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      05abadd3054eb918a1046262172f9ccc

      SHA1

      3ce634d76b4b2535e550293f00814b266b1ab301

      SHA256

      baa71f4052f44ed4847f3cc87be2115a0a10f15afad2402acd1cd0ef5c4a3f87

      SHA512

      ab9efe4d87f043df15ecfc20b888a9864c95578b5949dd2166a5f0b6693a5dc4548a854f3487d93788993191ebf4190b4ff81ba5a467c775ca3c1f77020f95bf

    • \ProgramData\FE7B.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/1944-11711-0x0000000000240000-0x0000000000280000-memory.dmp

      Filesize

      256KB

    • memory/1944-11714-0x000000007EF80000-0x000000007EF81000-memory.dmp

      Filesize

      4KB

    • memory/1944-11713-0x000000007EF20000-0x000000007EF21000-memory.dmp

      Filesize

      4KB

    • memory/1944-11712-0x0000000000240000-0x0000000000280000-memory.dmp

      Filesize

      256KB

    • memory/1944-11709-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

      Filesize

      4KB

    • memory/1944-11744-0x000000007EF60000-0x000000007EF61000-memory.dmp

      Filesize

      4KB

    • memory/1944-11743-0x000000007EF40000-0x000000007EF41000-memory.dmp

      Filesize

      4KB

    • memory/2512-0-0x00000000001A0000-0x00000000001E0000-memory.dmp

      Filesize

      256KB