Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2024 03:24

General

  • Target

    2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe

  • Size

    147KB

  • MD5

    af1398f1ed01ca6264103405691c1eb7

  • SHA1

    faa0ca77538c07e98ab62c68e12f477cfe319cb0

  • SHA256

    8e26b0b429c46d959aa0193685bdbe0ed0ff19a3a5bd316e976a99084d800bae

  • SHA512

    8b1ccc69a04123f535460729d4632c3120f298eb8c2fe4fcc2a914a9fdf9cc715bb54633248e9118dff3241469afdaa3f698317b4501a34f47541705ab049943

  • SSDEEP

    1536:lzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDnSlfefmViaPukTQfxeK1FqGa1v:mqJogYkcSNm9V7DnYWfiiarTmKDmOHT

Malware Config

Extracted

Path

C:\1lGbHM0Gk.README.txt

Ransom Note
-------------YOUR DATA IS ENCRYPTED! -------------------- >>>> Write us to the e-mail and ask how to decrypt files: [email protected] >>>> Your personal DECRYPTION ID: 354FEE4 Unlocking your data is possible only with our software. All your files were encrypted and important data was copied to our storage If you want to recover files, contact the operator in the TOX application, enter YOUR ID 354FEE4 Add the ID 21402979683F7B36CF675B23D49021C26074512599459413C7FD573052A9902383D8957302CD of your personal operator as a friend so that you can start chatting. If the Operator did not respond within 24 hours or encountered any problem then send an email to our support [email protected] In the header of the letter, indicate your ID and attach 2-3 infected files to generate a private key and compile the decryptor Files should not have important information and should not exceed the size of more than 5 MB After receiving the ransom, we will send a recovery tool with detailed instructions within an hour and delete your files from our storages --------- Attention --------- Do not rename encrypted files. Do not try to decrypt your data using third party software, it may cause permanent data loss. If you refuse to pay the ransom, Important Data that contains personal confidential information or trade secrets will be sold to third parties interested in them. In any case, we will receive a payment, and your company will face problems in law enforcement and judicial areas. >>>>>Don't be afraid to contact us. Remember, this is the only way to recover your data.<<<<<<

Signatures

  • Renames multiple (608) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-11_af1398f1ed01ca6264103405691c1eb7_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\ProgramData\AE80.tmp
      "C:\ProgramData\AE80.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\AE80.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1045960512-3948844814-3059691613-1000\PPPPPPPPPPP

    Filesize

    129B

    MD5

    039b230df4fc96afd196b073a0a81a04

    SHA1

    304f0191cd6550bcdb407be796c60c0bd60195c6

    SHA256

    a5286b088d8fad66ab5ef0b4d0016b75b3ab65402049227498604cc799974c98

    SHA512

    1eede4422fca3877c93660dcbb7209193866d6b7771e95fb0d0856dfd4e688b8d89f42125d616baba388eed4aaf45856885ab1309850dcda653da1084ef8dd35

  • C:\1lGbHM0Gk.README.txt

    Filesize

    1KB

    MD5

    62b70d1c1f0e369d876442e884f5cb30

    SHA1

    c1e6808f6a867c03010d0978bf8fd468d637c711

    SHA256

    11b3e376a6d123e88d2b39f7bed1a6c7f818ddf15ce32fb5a2cbb29932bfe321

    SHA512

    191a92f027b6100f1468847b8eb13a1dcd29c17860bba0f8a4645273c9fc6708372f57d2442d742f0daae696a12c7697982d267aff97b19b6a0fa6f6a8cca476

  • C:\ProgramData\AE80.tmp

    Filesize

    14KB

    MD5

    294e9f64cb1642dd89229fff0592856b

    SHA1

    97b148c27f3da29ba7b18d6aee8a0db9102f47c9

    SHA256

    917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

    SHA512

    b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

  • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

    Filesize

    147KB

    MD5

    9f9a5aa020d4c8df5b5fab2d29b680f9

    SHA1

    e3f2a7f6ccc3bd532813a0c70fe74c7abbb96ca4

    SHA256

    b14f9ba3ec1ae5e435084a10771bf818f431e312f2dafcd71fde0430e5efff79

    SHA512

    0b024bd199c7597b711b5d52cfc20984550b11ea167a76a224d5652e817df5e3b9e5e3bb2d00e09a59dbae2566929fa9be8b3262cfdef74a1e1a709b8a959d33

  • F:\$RECYCLE.BIN\S-1-5-21-1045960512-3948844814-3059691613-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    93fd61f71bf355010fc46a93c6a71c36

    SHA1

    676d50faa0f572836a4c2e9c6bd3ab54222d90b8

    SHA256

    4fdbfd7440ee5e13f79e4dd81e609994829e9ced500fc4e7194ed3e98e9ec61d

    SHA512

    1bb03afe18a28a2a2a5a261faedc1a8a89f1371d4403b440bdfdc81fbac9a1c845b6638155dcfde0f6c8b90b74ea04ddc3ee9876be28c232ae31a302bdc5c8a2

  • memory/1364-2798-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

    Filesize

    4KB

  • memory/1364-2792-0x000000007FE40000-0x000000007FE41000-memory.dmp

    Filesize

    4KB

  • memory/1364-2797-0x000000007FE20000-0x000000007FE21000-memory.dmp

    Filesize

    4KB

  • memory/1364-2796-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/1364-2827-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

    Filesize

    4KB

  • memory/1364-2828-0x000000007FE00000-0x000000007FE01000-memory.dmp

    Filesize

    4KB

  • memory/4784-0-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/4784-2-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/4784-2795-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/4784-2794-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/4784-2793-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB

  • memory/4784-1-0x00000000028D0000-0x00000000028E0000-memory.dmp

    Filesize

    64KB