Analysis

  • max time kernel
    94s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2024 02:25

General

  • Target

    2024-11-27_12ee1481a91f84a0bc71b45aa00844b0_darkside.exe

  • Size

    156KB

  • MD5

    12ee1481a91f84a0bc71b45aa00844b0

  • SHA1

    309d2273d6875c14acb8976c429e022d9ed5a6ee

  • SHA256

    421f922658b985855a580ad3d6736c55817d252a9d6104c944786f7aae393b6b

  • SHA512

    e3293bc77e8177f7abc3a8b51ce05c20941735f9f3c9902201c8f7907529a25d3e1654704b7163324a6ed3b8604e6002ddcc7aa79ef2a8ec609ea548d160075a

  • SSDEEP

    3072:+DDDDDDDDDDDDDDDDDDDE45d/t6sVkgZqltP3368JmSLTFh1zgH3/W:I5d/zugZqll30SD1gH3

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-11-27_12ee1481a91f84a0bc71b45aa00844b0_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-11-27_12ee1481a91f84a0bc71b45aa00844b0_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\ProgramData\A316.tmp
      "C:\ProgramData\A316.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\A316.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3140
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-3350944739-639801879-157714471-1000\desktop.ini

    Filesize

    129B

    MD5

    87680061c6a3680a467ff994b4bcccf6

    SHA1

    549a426fc135c3c6ab7baf51c8a728eba2c9b677

    SHA256

    d92827d86fd8af15698b4326394e348864b8e5e0e741386e183c0ee941887cc4

    SHA512

    6f2a70c1a8aac040bb9106180cafcd96700786e945725b66e74362816e81c932e9c2280d887d41759ebf1403bbab0b866ade737a3f9b6b89ef246fe0419cf2be

  • C:\ProgramData\A316.tmp

    Filesize

    14KB

    MD5

    294e9f64cb1642dd89229fff0592856b

    SHA1

    97b148c27f3da29ba7b18d6aee8a0db9102f47c9

    SHA256

    917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

    SHA512

    b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

  • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

    Filesize

    156KB

    MD5

    6a167c16c922d20852387d4fc266c6d5

    SHA1

    1924ba9bc90212e0be590c3c64cfa2942992c0cc

    SHA256

    2b1fbedac71a27aa1cf7ceae4b820cc9fc1c096475cd5ad265377e3f270eeeea

    SHA512

    ebca506f2a0aeb3b996f5cd96da9656ce587987cc89b063f14ae95383d2090672b26f1a067d4a6041a9d2d9438bb3357cbbf70fe75e1ac976aea891b13148716

  • F:\$RECYCLE.BIN\S-1-5-21-3350944739-639801879-157714471-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    c5b1a7ed3184dc7ca1cbd8c3d1e460a1

    SHA1

    9920e85829cf6570909a672d14f81caf692a4c6e

    SHA256

    8c68d96d3440ebd32a743d6d8d486217319e1c8f3aa16ec732da0993dc09e67c

    SHA512

    b5052149c02f636c6f86526efe78985a2dbb0ac750cb1f1ef0810e15cef0721537c9685c43ee24851e25c4cd6b37e7ab256c0c8b1057415639235ec8a76b13df

  • memory/2212-2-0x00000000032C0000-0x00000000032D0000-memory.dmp

    Filesize

    64KB

  • memory/2212-1-0x00000000032C0000-0x00000000032D0000-memory.dmp

    Filesize

    64KB

  • memory/2212-0-0x00000000032C0000-0x00000000032D0000-memory.dmp

    Filesize

    64KB

  • memory/3672-92-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

    Filesize

    4KB

  • memory/3672-93-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/3672-90-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/3672-91-0x000000007FE20000-0x000000007FE21000-memory.dmp

    Filesize

    4KB

  • memory/3672-89-0x000000007FE40000-0x000000007FE41000-memory.dmp

    Filesize

    4KB

  • memory/3672-122-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/3672-123-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/3672-127-0x000000007FE00000-0x000000007FE01000-memory.dmp

    Filesize

    4KB

  • memory/3672-126-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

    Filesize

    4KB