Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 10:28
Behavioral task
behavioral1
Sample
2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe
-
Size
150KB
-
MD5
f24ce79d82b9bf5196870d70b397c885
-
SHA1
d12defeab969c6e033b043b7061d85aab68cd165
-
SHA256
635c74ec2d6f50ddab0a1ee3a28fa54b459b73efb5af47993a99714beaecfbc3
-
SHA512
b54b5df4343309fc8cc75bc4038b49e1cb409d7a0f4ac2676f4e5636575c9cbb8412aa25f01db1404031ce910f654e324daaa06b17eddb60f9dfae9e24009bd8
-
SSDEEP
3072:F6glyuxE4GsUPnliByocWepHHPUwTAyeM+Sr/:F6gDBGpvEByocWeNHfTA0x/
Malware Config
Extracted
C:\8bTDEWLVO.README.txt
Signatures
-
Renames multiple (619) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\desktop.ini 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeDebugPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: 36 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeImpersonatePrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeIncBasePriorityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeIncreaseQuotaPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: 33 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeManageVolumePrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeProfSingleProcessPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeRestorePrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSystemProfilePrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeTakeOwnershipPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeShutdownPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeDebugPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeBackupPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe Token: SeSecurityPrivilege 4568 2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD51edfc306f12858f7367d84f60309929e
SHA1fcb18f326849819b91609c4922bad018ec285a78
SHA25638bf006c83a837e6a69b6de8a011241eccb8cfdc179fa836f12b3e00f646d051
SHA5126fa32734cb72726fd5e17c153a924036963b0f8003265b69236a2fcc784c386d4cf12cdfc3528c8f999586ea37e43e75217fc6b3cf9eb3ce006cf1b2851ee111
-
Filesize
4KB
MD520a0b8c5877cf5dac0c86412c8e55dcc
SHA1b3b59e7a0d6e8b42d6b7d2d4ae62d091f359c495
SHA2564222ab428336afb50e7e8a212bad91dff44bb5c96a74d32a11061bdb3d6130eb
SHA512599727ae1dede5a64699d14992b5a9ae4d534bb380a37b05f6bdb0b976b34e3f7b6d6fc677757dbe1e2c6dd85a92139aab66b1df9af68290ac7753b3ad9e8a88
-
Filesize
129B
MD5052ee64d9f692b732681ccac67f8e7bf
SHA1dbe140c5172c2da83e3e244c58ad7db7a5206a2a
SHA2567cfea75fccc5e6b369d4a028837dd098dae6a329005f6c5fd777de7a10643bc9
SHA512e9957bf116aea6b5614453fd121067284b049bdf2e658bf9a503af57754b18b2cb3224c9101b839c62d3b819bb11ea1f5a4e9e9479ae5b800c75527725b1d2ab