Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 03:28
Behavioral task
behavioral1
Sample
2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe
-
Size
147KB
-
MD5
7089e64c176cdf1938e712196c246bcf
-
SHA1
82ca26f593103d27d81460eb144efbccb1533e03
-
SHA256
222416505b9368d2b6c19b361158dec5bffedacd44afa447c292d4f0b5288f05
-
SHA512
16f1e1652d0579c59048ce8377eed68013f7edce3ca80418b699152cf69208cd7b8191df06b4ab4c05a2f31d76496bec14c5b3935b30d24104847fb13ceca2a3
-
SSDEEP
3072:z6glyuxE4GsUPnliByocWepBdmmmuHu7i0XS1:z6gDBGpvEByocWeDdmmmfS1
Malware Config
Extracted
C:\4xdd7DWuD.README.txt
Signatures
-
Renames multiple (328) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 336 C5CF.tmp -
Executes dropped EXE 1 IoCs
pid Process 336 C5CF.tmp -
Loads dropped DLL 1 IoCs
pid Process 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 336 C5CF.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C5CF.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp 336 C5CF.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeDebugPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: 36 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeImpersonatePrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeIncBasePriorityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeIncreaseQuotaPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: 33 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeManageVolumePrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeProfSingleProcessPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeRestorePrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSystemProfilePrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeTakeOwnershipPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeShutdownPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeDebugPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeBackupPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe Token: SeSecurityPrivilege 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2504 wrote to memory of 336 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 32 PID 2504 wrote to memory of 336 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 32 PID 2504 wrote to memory of 336 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 32 PID 2504 wrote to memory of 336 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 32 PID 2504 wrote to memory of 336 2504 2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe 32 PID 336 wrote to memory of 2188 336 C5CF.tmp 33 PID 336 wrote to memory of 2188 336 C5CF.tmp 33 PID 336 wrote to memory of 2188 336 C5CF.tmp 33 PID 336 wrote to memory of 2188 336 C5CF.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-13_7089e64c176cdf1938e712196c246bcf_darkside.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\ProgramData\C5CF.tmp"C:\ProgramData\C5CF.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\C5CF.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1481⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD50c110daa42d2e8893ccf8eac1167be62
SHA1518d48454b730d2d6d11a99cc27f41e8db239c3c
SHA2569c62726aa6d8faacc6bf7869a7144e9dddd67de7c7e2b0115deb814f3e1a9b4a
SHA5127c7fb08de3fd92899167f6e7fefc99d299851dafc999fa0d8cbbc086a02ebf8ccd44ccc6b9308b1912a3b07c52ce73c4a8a8696e86d1a24a3d972df57eb9eaf6
-
Filesize
1KB
MD581de0747475d79ef34736aa71fec345a
SHA10beb0d4633bf65b81a926317de7153dd1c74c5c6
SHA256bc9319a1082e80c734a3a246e92fee23a5d2c4023f38142ef43d5f7df6851b2b
SHA51241ead29b56b5f105f7b1719271dde3ce7e994cd044021642ed795241454369c04386da3254bab7efe4042f07267559105cab095ac9fb5f5fb0ccd797183dd090
-
Filesize
147KB
MD54bb3d0ed4a14d0c8b670b0bb191ef828
SHA172689f1b217f9434b78c060dc74410475d793bad
SHA2560ed291e8a2ec6e8995a72a418c70caba25cb0eed3a27bd285de4a58d5deed746
SHA512a1060bd3bdfac8f91b08fa43d8e205782b0012e720b9d70e839aa5388da3ff4c26289e77651d1f6ad76d6c6aa55c03f7eb6918e5ae6a47cf5f166b6a9135625b
-
Filesize
129B
MD5b41e285ef27cbc69ec2401d3f66b860b
SHA100ea6689f80bb7f35492f6387e76c14b7c892aff
SHA256fd7a16ac3d0a2fb20271dced871cb5aa73d4111055ccec04f3d244b30d0e364a
SHA5121e8f07eb1ee1caa4f4d702fa08a72fcd66b3c74643c5b222f953f8a9ceb7868654588f7425755d3a6723e3a0472b7dc08262b2e90f8bebac7e50781601ef90cc
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf