Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 10:28

General

  • Target

    2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe

  • Size

    150KB

  • MD5

    f24ce79d82b9bf5196870d70b397c885

  • SHA1

    d12defeab969c6e033b043b7061d85aab68cd165

  • SHA256

    635c74ec2d6f50ddab0a1ee3a28fa54b459b73efb5af47993a99714beaecfbc3

  • SHA512

    b54b5df4343309fc8cc75bc4038b49e1cb409d7a0f4ac2676f4e5636575c9cbb8412aa25f01db1404031ce910f654e324daaa06b17eddb60f9dfae9e24009bd8

  • SSDEEP

    3072:F6glyuxE4GsUPnliByocWepHHPUwTAyeM+Sr/:F6gDBGpvEByocWeNHfTA0x/

Malware Config

Extracted

Path

C:\8bTDEWLVO.README.txt

Ransom Note
X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X + Welcome to + + + + ||||| ||||| | | ||||| ||||||| ||||| | | ||||| + + | | | | | | | | | | | | | | || + + | ||||| | ||||| | | | | | | | | + + | | | | | | | | | | || | | || + + | | | | | | | | | | | | | || + + ||||| | | | | | ||||| ||||| | | ||||| + + + + services + X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X + DO NOT: + + --Modify, rename, copy or move any files or + + you can DAMAGE them and decryption will be impossible. + + --Use any third-party or public Decryption software, it also may DAMAGE files. + + --Shutdown or Reset your system, it can DAMAGE files. + + --Hire any third-party negotiators (recovery|police and etc). + X--------------------------------------------------------------------------------------X + We've also downloaded your most important data just in case. + + If you don't pay, it will be released to the media + + and|or sold to any third party. + X--------------------------------------------------------------------------------------X + 1) WHAT TO DO: + + -> You must contact us as soon as possible (you will find contacts below) + + -> You must purchase our tool for a SMALL fee, so you can recover your files. + + Without our decryption keys this is not possible + + -> You must make a deal with us to avoid leaking your data + + + + 2) YOUR OPTIONS: + + -> IF THERE IS NO CONTACT OR THE DEAL IS DONE WITHIN 3 DAYS: + + The decryption key will be permanently deleted, and recovery will be impossible. + + All your data will be published and|or sold to any third parties. + + Information about vulnerabilities in your network, may be published and|or sold + + + + -> IF WE MAKE A DEAL: + + We will provide you with a decryption key and manual. + + We will delete all your files from our file storage with proof of deletion. + + We guarantee that we will not share any details with third parties + + We will provide you with a attack vector and a list of security recommendations + X--------------------------------------------------------------------------------------X + Contact us + + -> [email protected] + + -> [email protected] + + Your personal DECRYPTION ID: VISIO + X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X

Signatures

  • Renames multiple (343) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2588
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x148
    1⤵
      PID:1704

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2872745919-2748461613-2989606286-1000\desktop.ini

      Filesize

      129B

      MD5

      a703b76198fe908a0651ec8da5c18ba0

      SHA1

      90d82acf32857f76dd96c2b652117e5cac6dc3e4

      SHA256

      a2b0765608895f3a9b56454962b1e98fc678f4347d3353f162e2a9967523e65e

      SHA512

      d6db9705dea10ecdf4916a53535ee5ca144fbb538bcc0bb04962249f1b374f08f74b7001dbc70c29bb1c35f5212ea33ee1a6224eece717cf8f6fbb360d304b12

    • C:\8bTDEWLVO.README.txt

      Filesize

      4KB

      MD5

      20a0b8c5877cf5dac0c86412c8e55dcc

      SHA1

      b3b59e7a0d6e8b42d6b7d2d4ae62d091f359c495

      SHA256

      4222ab428336afb50e7e8a212bad91dff44bb5c96a74d32a11061bdb3d6130eb

      SHA512

      599727ae1dede5a64699d14992b5a9ae4d534bb380a37b05f6bdb0b976b34e3f7b6d6fc677757dbe1e2c6dd85a92139aab66b1df9af68290ac7753b3ad9e8a88

    • F:\$RECYCLE.BIN\S-1-5-21-2872745919-2748461613-2989606286-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      5f663f8648346715bf6a4b03e157d782

      SHA1

      d9a44e7abf6e3f1512ad8d0a48426c36c4305e1b

      SHA256

      ad90157ca7d9afb0a6ddeb7c764dad6e25bcddf4d978e884ad73d64fcfafb2a9

      SHA512

      61ebaa967906c22b4a71e3d6376d33e0273495411048d970097bfba3287d8938ec73b5c2ff43d552c69c3a0d8626360dcf09f732ee066ed3051fb0b958d7da1f

    • memory/2588-0-0x0000000000C00000-0x0000000000C40000-memory.dmp

      Filesize

      256KB