Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 03:24
Behavioral task
behavioral1
Sample
2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe
-
Size
147KB
-
MD5
af1398f1ed01ca6264103405691c1eb7
-
SHA1
faa0ca77538c07e98ab62c68e12f477cfe319cb0
-
SHA256
8e26b0b429c46d959aa0193685bdbe0ed0ff19a3a5bd316e976a99084d800bae
-
SHA512
8b1ccc69a04123f535460729d4632c3120f298eb8c2fe4fcc2a914a9fdf9cc715bb54633248e9118dff3241469afdaa3f698317b4501a34f47541705ab049943
-
SSDEEP
1536:lzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDnSlfefmViaPukTQfxeK1FqGa1v:mqJogYkcSNm9V7DnYWfiiarTmKDmOHT
Malware Config
Extracted
C:\1lGbHM0Gk.README.txt
Signatures
-
Renames multiple (608) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation AE80.tmp -
Deletes itself 1 IoCs
pid Process 1364 AE80.tmp -
Executes dropped EXE 1 IoCs
pid Process 1364 AE80.tmp -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\desktop.ini 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1364 AE80.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AE80.tmp -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp 1364 AE80.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeDebugPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: 36 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeImpersonatePrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeIncBasePriorityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeIncreaseQuotaPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: 33 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeManageVolumePrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeProfSingleProcessPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeRestorePrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSystemProfilePrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeTakeOwnershipPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeShutdownPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeDebugPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeBackupPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe Token: SeSecurityPrivilege 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1364 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 86 PID 4784 wrote to memory of 1364 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 86 PID 4784 wrote to memory of 1364 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 86 PID 4784 wrote to memory of 1364 4784 2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe 86 PID 1364 wrote to memory of 2020 1364 AE80.tmp 87 PID 1364 wrote to memory of 2020 1364 AE80.tmp 87 PID 1364 wrote to memory of 2020 1364 AE80.tmp 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe"1⤵
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\ProgramData\AE80.tmp"C:\ProgramData\AE80.tmp"2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\AE80.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2020
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5039b230df4fc96afd196b073a0a81a04
SHA1304f0191cd6550bcdb407be796c60c0bd60195c6
SHA256a5286b088d8fad66ab5ef0b4d0016b75b3ab65402049227498604cc799974c98
SHA5121eede4422fca3877c93660dcbb7209193866d6b7771e95fb0d0856dfd4e688b8d89f42125d616baba388eed4aaf45856885ab1309850dcda653da1084ef8dd35
-
Filesize
1KB
MD562b70d1c1f0e369d876442e884f5cb30
SHA1c1e6808f6a867c03010d0978bf8fd468d637c711
SHA25611b3e376a6d123e88d2b39f7bed1a6c7f818ddf15ce32fb5a2cbb29932bfe321
SHA512191a92f027b6100f1468847b8eb13a1dcd29c17860bba0f8a4645273c9fc6708372f57d2442d742f0daae696a12c7697982d267aff97b19b6a0fa6f6a8cca476
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
Filesize
147KB
MD59f9a5aa020d4c8df5b5fab2d29b680f9
SHA1e3f2a7f6ccc3bd532813a0c70fe74c7abbb96ca4
SHA256b14f9ba3ec1ae5e435084a10771bf818f431e312f2dafcd71fde0430e5efff79
SHA5120b024bd199c7597b711b5d52cfc20984550b11ea167a76a224d5652e817df5e3b9e5e3bb2d00e09a59dbae2566929fa9be8b3262cfdef74a1e1a709b8a959d33
-
Filesize
129B
MD593fd61f71bf355010fc46a93c6a71c36
SHA1676d50faa0f572836a4c2e9c6bd3ab54222d90b8
SHA2564fdbfd7440ee5e13f79e4dd81e609994829e9ced500fc4e7194ed3e98e9ec61d
SHA5121bb03afe18a28a2a2a5a261faedc1a8a89f1371d4403b440bdfdc81fbac9a1c845b6638155dcfde0f6c8b90b74ea04ddc3ee9876be28c232ae31a302bdc5c8a2