Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2024 06:26

General

  • Target

    2024-12-05_61ffbe6fc8897d4a6211d228a6f2f15e_darkside.exe

  • Size

    153KB

  • MD5

    61ffbe6fc8897d4a6211d228a6f2f15e

  • SHA1

    2f9bc7b18a9ddd67b96b5c14485ea0da76d13bcb

  • SHA256

    505aebf78a04697109439d5486784f398e8c5d25a378eda3a8468898717117a5

  • SHA512

    a2cd477e31760b815c8296b4749cfa02ec1b9f61b46f475a5a175266a787fd8f16fde67fbd3d45f8d153b6c7345399c3678ef9ae4a202187cdb490a427e4d91d

  • SSDEEP

    3072:MqJogYkcSNm9V7DMVYXQ/IfjRJ5JFF0CcT:Mq2kc4m9tDMVKQep

Malware Config

Extracted

Path

C:\BDCseIyDm.README.txt

Family

lockbit

Ransom Note
~~~ LockBit 3.0 the world's fastest ransomware since 2019~~~ >>>> Your data are stolen and encrypted The data will be published on TOR website if you do not pay the ransom Links for Tor Browser: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion Links for the normal browser http://lockbitapt.uz http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly >>>> What guarantees that we will not deceive you? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. Life is too short to be sad. Be not sad, money, it is only paper. If we do not give you decrypters, or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. We attack the companies worldwide and there is no dissatisfied victim after payment. You can obtain information about us on twitter https://twitter.com/hashtag/lockbit?f=live >>>> You need contact us and decrypt one file for free on these TOR sites with your personal DECRYPTION ID Download and install TOR Browser https://www.torproject.org/ Write to a chat and wait for the answer, we will always answer you. Sometimes you will need to wait for our answer because we attack many companies. Links for Tor Browser: http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion Link for the normal browser http://lockbitsupp.uz If you do not get an answer in the chat room for a long time, the site does not work and in any other emergency, you can contact us in jabber or tox. Tox ID LockBitSupp: 3085B89A0C515D2FB124D645906F5D3DA5CB97CEBEA975959AE4F95302A04E1D709C3C4AE9B7 XMPP (Jabber) Support: [email protected] [email protected] >>>> Your personal DECRYPTION ID: 29130D887E30122D45D439EC4234F2C5 >>>> Warning! Do not DELETE or MODIFY any files, it can lead to recovery problems! >>>> Warning! If you do not pay the ransom we will attack your company repeatedly again! >>>> Advertisement Would you like to earn millions of dollars $$$ ? Our company acquire access to networks of various companies, as well as insider information that can help you steal the most valuable data of any company. You can provide us accounting data for the access to any company, for example, login and password to RDP, VPN, corporate email, etc. Open our letter at your email. Launch the provided virus on any computer in your company. You can do it both using your work computer or the computer of any other employee in order to divert suspicion of being in collusion with us. Companies pay us the foreclosure for the decryption of files and prevention of data leak. You can contact us using Tox messenger without registration and SMS https://tox.chat/download.html. Using Tox messenger, we will never know your real name, it means your privacy is guaranteed. If you want to contact us, write in jabber or tox. Tox ID LockBitSupp: 3085B89A0C515D2FB124D645906F5D3DA5CB97CEBEA975959AE4F95302A04E1D709C3C4AE9B7 XMPP (Jabber) Support: [email protected] [email protected] If this contact is expired, and we do not respond you, look for the relevant contact data on our website via Tor or Brave browser Links for Tor Browser: http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion Links for the normal browser http://lockbitapt.uz http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
URLs

http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion

http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion

http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion

http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion

http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion

http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion

http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion

http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion

http://lockbitapt.uz

http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly

http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly

http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly

http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly

http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly

http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly

http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly

http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly

http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly

https://twitter.com/hashtag/lockbit?f=live

Signatures

  • Lockbit

    Ransomware family with multiple variants released since late 2019.

  • Lockbit family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-05_61ffbe6fc8897d4a6211d228a6f2f15e_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-05_61ffbe6fc8897d4a6211d228a6f2f15e_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:828
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:4968
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{E81B2DFA-CCFE-4945-BD78-EE2A531DB1B8}.xps" 133778535986480000
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        PID:1656

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-493223053-2004649691-1575712786-1000\RRRRRRRRRRR

      Filesize

      129B

      MD5

      1d06070f4a27acdbad3dd3cecf130036

      SHA1

      8b022793cec962c0a045e06abfc71b4177d681e2

      SHA256

      9bb6eeb5169f8279a4ee5c73615da0be20910a227d07db385fb57445ddc73ae7

      SHA512

      d1397fe50a8f2e88f8ec0d99d856621d510bd47cde9488afee0442e6b7d55be25c327f4d7d47d1ea68bc067b113eaf3cefc106c0dcdc863c4c63a6fc08166881

    • C:\BDCseIyDm.README.txt

      Filesize

      6KB

      MD5

      37ac594ea251c5296bfc36572bf6831f

      SHA1

      a3a981d1b228d1795e2f4226c009432dd8b41480

      SHA256

      e87d9518e8eff54255748156c2ed74521a1e73ad5a06f6eb455a3500b512b432

      SHA512

      63994c3905cf995373d4ded147f898ba4042153d547d65bbffa7ba38af98b91f2d331e0491b8085c41cc3032143799e493a53ef70be01095cbd1da936cf08961

    • C:\Users\Admin\AppData\Local\Temp\{DEC9B579-271F-43AD-9D39-C49809FC3629}

      Filesize

      4KB

      MD5

      92980feadf31e415f482e18d7df283cb

      SHA1

      a92e96205fec5dc81aa650b352324ce255a9c2b7

      SHA256

      ec5fc9f906a77ecae98cabb86e4baedb19f0ab1fc8edad0e68c21949fe7ce4e5

      SHA512

      ee8bc0c92dd6386cca6ffe10ef4be1166765d3a54af6473a4dfffc4c997c0dd27e50c068c2d7f906d87fcec8f19e6d493c310967eef1dec2e63c0d2d01081cd5

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      4KB

      MD5

      03dcc99e6eb92efef5833baceb9d7777

      SHA1

      959cab4f1757beb6da669de066b767e992bc8ad3

      SHA256

      59bd4d5e2368fab44be452e037268fd18d45f4658b5ee50979fea8e628829653

      SHA512

      6b3ab29652af0059b3b96581be13a6038f5baee24bfba94b077b865fb37a020fda9348e87d48bb390e9be3ef2fb7b0d1a9ebdd5687144eb2e8f4d27f30d039b5

    • F:\$RECYCLE.BIN\S-1-5-21-493223053-2004649691-1575712786-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      d5c95b712cad5fc2a3b0eaf71f447e1a

      SHA1

      13f1454fff91511893988d90ceea0f5323ef6700

      SHA256

      a98db9f9ad957773858d529c7511f6bea1be05ced64d48ed48ac34f290dafe88

      SHA512

      a91a05cde58f1d5088d32418a61f7647f0ec2a6d1a6f6729395070e8a1ee35178cec1d4cca695c3a67e8ccc567a18dd782832c94d04464a64bccc1acdc98fc77

    • memory/1656-2975-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/1656-2972-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/1656-2973-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/1656-2974-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/1656-2976-0x00007FFCEA1D0000-0x00007FFCEA1E0000-memory.dmp

      Filesize

      64KB

    • memory/1656-2978-0x00007FFCE8110000-0x00007FFCE8120000-memory.dmp

      Filesize

      64KB

    • memory/1656-2979-0x00007FFCE8110000-0x00007FFCE8120000-memory.dmp

      Filesize

      64KB

    • memory/2988-2959-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

      Filesize

      64KB

    • memory/2988-2961-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

      Filesize

      64KB

    • memory/2988-2960-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

      Filesize

      64KB

    • memory/2988-0-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

      Filesize

      64KB

    • memory/2988-2-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

      Filesize

      64KB

    • memory/2988-1-0x0000000002CB0000-0x0000000002CC0000-memory.dmp

      Filesize

      64KB