Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 00:27

General

  • Target

    2024-12-31_eb514bb7e05e3132577b27b265010021_darkside.exe

  • Size

    148KB

  • MD5

    eb514bb7e05e3132577b27b265010021

  • SHA1

    b8409f7752938d861eff70114424aa933cfb70d8

  • SHA256

    9258e8b4ac7642dc20d76e03acb67198eb6ccfb181f9a23a94ea3d4024dd3a13

  • SHA512

    874831f03fbc8f0bf51dd6eee28c17af3b80de7869656a521b24947cf45164ff4ed9099efb82af7b607f702811e0935aeb33e54f7b3c372dd2c0aa247b92344c

  • SSDEEP

    1536:9zICS4AwwRlcz5AxE4vGP1iU8KnliIs3iocZMgkGJp1+aASjr9pntaAHwQmMPmIa:u6glyuxE4GsUPnliByocWepMaAE1rHp

Malware Config

Extracted

Path

C:\JBZxC9GYi.README.txt

Ransom Note
******************************************************************************************** ************************ Your data are stolen and encrypted **************************** 1. How to contact? * 1. You can use tox: https://qtox.github.io/ send message to us. Tox ID : E39D0A412302DF31B24613AA88D5859A5432A5FCBAD25917E93DA84D56CB411F88119E8AEB78 * 2. You can send email to us, Email address : [email protected] Suggestion : Contact us in two ways at the same time, if you haven't received a reply to your email, please check your spam folder. 2. How to view leaked data? * 1. Download Tor Browser: https://www.torproject.org/download darkness website can noly visit use tor. * 2. Click connect button to connect Tor internet * 3. Visit: http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/ 3. What guarantees that we will not deceive you? * We are not a politically motivated group and we do not need anything other than your money If you pay, we will provide you the programs for decryption and we will delete your data. * If we do not give you decrypters or we do not delete your data after payment, then nobody will pay us in the future. Therefore to us our reputation is very important. * We attack the hundreds of companies and there is no dissatisfied victim after payment. 4. What happens if you do not pay? * If you don't pay, the data will be sold on auction platform after 72 hours, data will be bought by your competitors, and we will report your company fail to protect data as a result of a data breach to the data protection authority in your country, you could face significant fines. * Do not hesitate for a long time, the sooner pay, the sooner your company will be safe. * If you pay, we will delete data immediately, we can also provide you an paid hacking services. You can pay for the services after the hacking is successful. Please trust our strength. 5. Warning! * Do not DELETE or MODIFY any files, it can lead to recovery problems! * If you do not pay the ransom we will attack your company repeatedly again! *** Your DECRYPTION ID: 030D4BF7EBD5712A0B379597C625953A ************************ Your data are stolen and encrypted ************************** ******************************************************************************************
URLs

https://qtox.github.io/

http://zu3wfrmrkl4ltqqnpt3owp3cwa33rqwod4gpe3ttb5o4vf2is2gzm6qd.onion/

Signatures

  • Renames multiple (7712) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-31_eb514bb7e05e3132577b27b265010021_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-31_eb514bb7e05e3132577b27b265010021_darkside.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\ProgramData\400C.tmp
      "C:\ProgramData\400C.tmp"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\400C.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1144
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x150
    1⤵
      PID:1732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-3692679935-4019334568-335155002-1000\BBBBBBBBBBB

      Filesize

      129B

      MD5

      907c82e326d04d7995b1696cc2ad2f2d

      SHA1

      b81f738f708b8611980ce1c2028f46012d6d4d3a

      SHA256

      463bf8096f31126c327555244405be12687a4de282731be045dafcbee6da4fb9

      SHA512

      aa6eaa5b7bdd45ed6508677acd138d97c56263d12e0e810cf90817ed3e9335f93560b0b4c299c3a88f0a78d84848ef6f534c63765f54122c3bdd7f8d80628526

    • C:\JBZxC9GYi.README.txt

      Filesize

      2KB

      MD5

      3a19f17ff565df7afa4b5df22723ac10

      SHA1

      bb8c14167d4754f47ef49541c90680fe7f87f9fd

      SHA256

      943a743df659c801e00835e044ee6d35318d0d77d8290a66eef4d52983f29458

      SHA512

      4de0d9770227acffc9491d0646ca806444fd8430cdf2a185d2bca03e804250e72942e55e6b38e3e834093930d95fbe6464e6cb194709fe6327c7e2efae97a142

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      148KB

      MD5

      310f3d93e852aebcf36d845faf6e82a1

      SHA1

      8d6ba40db0342dbaf3da056d8bffef64755b91a6

      SHA256

      064207a403e69cc4873eef0c5aa2fd2450a0d6427930cf904e0690872ae2efcf

      SHA512

      6f7143e0cbbfcddb640e476ad696235708aaeed90e5e77389c017cf6986fe54bf2f92a9bfe1d44691b6fb4e84cc13b7ace653d2bdef3c08d4a634a1d6783b6d1

    • F:\$RECYCLE.BIN\S-1-5-21-3692679935-4019334568-335155002-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      fcafb0a40cbc75e840a8ce5f159eb80f

      SHA1

      eebf388481541c035f6db906208288d1322d2b31

      SHA256

      91cc1367ba8362f6355e75f37e810e6fd1ebace250b3434b9f70263728eb1016

      SHA512

      d639b152921da69da3f5596fd4c4bb93240e0b2c46f353523682912d2932fc9ff666187aeb78bac2982816f661ae91cd489edbd9170d6c2d1afe9d8a020f605c

    • \ProgramData\400C.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • memory/516-0-0x0000000000770000-0x00000000007B0000-memory.dmp

      Filesize

      256KB

    • memory/2884-11545-0x000000007EF80000-0x000000007EF81000-memory.dmp

      Filesize

      4KB

    • memory/2884-11546-0x000000007EF20000-0x000000007EF21000-memory.dmp

      Filesize

      4KB

    • memory/2884-11544-0x0000000002220000-0x0000000002260000-memory.dmp

      Filesize

      256KB

    • memory/2884-11543-0x0000000002220000-0x0000000002260000-memory.dmp

      Filesize

      256KB

    • memory/2884-11542-0x000000007EFA0000-0x000000007EFA1000-memory.dmp

      Filesize

      4KB

    • memory/2884-11575-0x000000007EF40000-0x000000007EF41000-memory.dmp

      Filesize

      4KB

    • memory/2884-11576-0x000000007EF60000-0x000000007EF61000-memory.dmp

      Filesize

      4KB