Analysis

  • max time kernel
    93s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 10:28

General

  • Target

    2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe

  • Size

    150KB

  • MD5

    f24ce79d82b9bf5196870d70b397c885

  • SHA1

    d12defeab969c6e033b043b7061d85aab68cd165

  • SHA256

    635c74ec2d6f50ddab0a1ee3a28fa54b459b73efb5af47993a99714beaecfbc3

  • SHA512

    b54b5df4343309fc8cc75bc4038b49e1cb409d7a0f4ac2676f4e5636575c9cbb8412aa25f01db1404031ce910f654e324daaa06b17eddb60f9dfae9e24009bd8

  • SSDEEP

    3072:F6glyuxE4GsUPnliByocWepHHPUwTAyeM+Sr/:F6gDBGpvEByocWeNHfTA0x/

Malware Config

Extracted

Path

C:\8bTDEWLVO.README.txt

Ransom Note
X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X + Welcome to + + + + ||||| ||||| | | ||||| ||||||| ||||| | | ||||| + + | | | | | | | | | | | | | | || + + | ||||| | ||||| | | | | | | | | + + | | | | | | | | | | || | | || + + | | | | | | | | | | | | | || + + ||||| | | | | | ||||| ||||| | | ||||| + + + + services + X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X + DO NOT: + + --Modify, rename, copy or move any files or + + you can DAMAGE them and decryption will be impossible. + + --Use any third-party or public Decryption software, it also may DAMAGE files. + + --Shutdown or Reset your system, it can DAMAGE files. + + --Hire any third-party negotiators (recovery|police and etc). + X--------------------------------------------------------------------------------------X + We've also downloaded your most important data just in case. + + If you don't pay, it will be released to the media + + and|or sold to any third party. + X--------------------------------------------------------------------------------------X + 1) WHAT TO DO: + + -> You must contact us as soon as possible (you will find contacts below) + + -> You must purchase our tool for a SMALL fee, so you can recover your files. + + Without our decryption keys this is not possible + + -> You must make a deal with us to avoid leaking your data + + + + 2) YOUR OPTIONS: + + -> IF THERE IS NO CONTACT OR THE DEAL IS DONE WITHIN 3 DAYS: + + The decryption key will be permanently deleted, and recovery will be impossible. + + All your data will be published and|or sold to any third parties. + + Information about vulnerabilities in your network, may be published and|or sold + + + + -> IF WE MAKE A DEAL: + + We will provide you with a decryption key and manual. + + We will delete all your files from our file storage with proof of deletion. + + We guarantee that we will not share any details with third parties + + We will provide you with a attack vector and a list of security recommendations + X--------------------------------------------------------------------------------------X + Contact us + + -> [email protected] + + -> [email protected] + + Your personal DECRYPTION ID: VISIO + X++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++X

Signatures

  • Renames multiple (619) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-31_f24ce79d82b9bf5196870d70b397c885_darkside.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-4050598569-1597076380-177084960-1000\YYYYYYYYYYY

    Filesize

    129B

    MD5

    1edfc306f12858f7367d84f60309929e

    SHA1

    fcb18f326849819b91609c4922bad018ec285a78

    SHA256

    38bf006c83a837e6a69b6de8a011241eccb8cfdc179fa836f12b3e00f646d051

    SHA512

    6fa32734cb72726fd5e17c153a924036963b0f8003265b69236a2fcc784c386d4cf12cdfc3528c8f999586ea37e43e75217fc6b3cf9eb3ce006cf1b2851ee111

  • C:\8bTDEWLVO.README.txt

    Filesize

    4KB

    MD5

    20a0b8c5877cf5dac0c86412c8e55dcc

    SHA1

    b3b59e7a0d6e8b42d6b7d2d4ae62d091f359c495

    SHA256

    4222ab428336afb50e7e8a212bad91dff44bb5c96a74d32a11061bdb3d6130eb

    SHA512

    599727ae1dede5a64699d14992b5a9ae4d534bb380a37b05f6bdb0b976b34e3f7b6d6fc677757dbe1e2c6dd85a92139aab66b1df9af68290ac7753b3ad9e8a88

  • F:\$RECYCLE.BIN\S-1-5-21-4050598569-1597076380-177084960-1000\DDDDDDDDDDD

    Filesize

    129B

    MD5

    052ee64d9f692b732681ccac67f8e7bf

    SHA1

    dbe140c5172c2da83e3e244c58ad7db7a5206a2a

    SHA256

    7cfea75fccc5e6b369d4a028837dd098dae6a329005f6c5fd777de7a10643bc9

    SHA512

    e9957bf116aea6b5614453fd121067284b049bdf2e658bf9a503af57754b18b2cb3224c9101b839c62d3b819bb11ea1f5a4e9e9479ae5b800c75527725b1d2ab

  • memory/4568-0-0x00000000033C0000-0x00000000033D0000-memory.dmp

    Filesize

    64KB

  • memory/4568-1-0x00000000033C0000-0x00000000033D0000-memory.dmp

    Filesize

    64KB

  • memory/4568-2-0x00000000033C0000-0x00000000033D0000-memory.dmp

    Filesize

    64KB

  • memory/4568-2956-0x00000000033C0000-0x00000000033D0000-memory.dmp

    Filesize

    64KB