Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/02/2025, 09:29
Behavioral task
behavioral1
Sample
2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe
-
Size
153KB
-
MD5
76ea46162624e381904f97abdf37a9e8
-
SHA1
6adbd73286ff46952a0fd66eabe7fcf018cf5a03
-
SHA256
d2d8f99f76e29b1814dd2c772a131e509872f56ae9fd73bfe9eaece47afc42de
-
SHA512
d4dc943c36133c8300816df9bd1e3b8d46ecfa9782334bb6705824b582d086d2e262401ae0206fe2c438afc500ed4d09ddc15ac89af479b4c41a25a0c3a5c63d
-
SSDEEP
3072:uqJogYkcSNm9V7DKSfS12tISpbhs7k50aT:uq2kc4m9tDK5+IwFs7kK
Malware Config
Extracted
C:\Ehlj0Zzma.README.txt
lockbit
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion
http://lockbitapt.uz
http://lockbitapt2yfbt7lchxejug47kmqvqqxvvjpqkmevv4l3azl3gy6pyd.onion.ly
http://lockbitapt5x4zkjbcqmz6frdhecqqgadevyiwqxukksspnlidyvd7qd.onion.ly
http://lockbitapt6vx57t3eeqjofwgcglmutr3a35nygvokja5uuccip4ykyd.onion.ly
http://lockbitapt34kvrip6xojylohhxrwsvpzdffgs5z4pbbsywnzsbdguqd.onion.ly
http://lockbitaptc2iq4atewz2ise62q63wfktyrl4qtwuk5qax262kgtzjqd.onion.ly
http://lockbitaptjpikdqjynvgozhgc6bgetgucdk5xjacozeaawihmoio6yd.onion.ly
http://lockbitaptq7ephv2oigdncfhtwhpqgwmqojnxqdyhprxxfpcllqdxad.onion.ly
http://lockbitaptstzf3er2lz6ku3xuifafq2yh5lmiqj5ncur6rtlmkteiqd.onion.ly
http://lockbitaptoofrpignlz6dt2wqqc5z3a4evjevoa3eqdfcntxad5lmyd.onion.ly
https://twitter.com/hashtag/lockbit?f=live
http://lockbitsupt7nr3fa6e7xyb73lk6bw6rcneqhoyblniiabj4uwvzapqd.onion
http://lockbitsupuhswh4izvoucoxsbnotkmgq6durg7kficg6u33zfvq3oyd.onion
http://lockbitsupn2h6be2cnqpvncyhj4rgmnwn44633hnzzmtxdvjoqlp7yd.onion
http://lockbitsupp.uz
https://tox.chat/download.html
Signatures
-
Lockbit
Ransomware family with multiple variants released since late 2019.
-
Lockbit family
-
Renames multiple (351) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself 1 IoCs
pid Process 1692 A821.tmp -
Executes dropped EXE 1 IoCs
pid Process 1692 A821.tmp -
Loads dropped DLL 1 IoCs
pid Process 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3290804112-2823094203-3137964600-1000\desktop.ini 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\Ehlj0Zzma.bmp" 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\Ehlj0Zzma.bmp" 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1692 A821.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A821.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Control Panel\Desktop\WallpaperStyle = "10" 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.Ehlj0Zzma 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.Ehlj0Zzma\ = "Ehlj0Zzma" 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ehlj0Zzma\DefaultIcon 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Ehlj0Zzma 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Ehlj0Zzma\DefaultIcon\ = "C:\\ProgramData\\Ehlj0Zzma.ico" 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Suspicious behavior: RenamesItself 26 IoCs
pid Process 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp 1692 A821.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeDebugPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: 36 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeImpersonatePrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeIncBasePriorityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeIncreaseQuotaPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: 33 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeManageVolumePrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeProfSingleProcessPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeRestorePrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSystemProfilePrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeTakeOwnershipPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeShutdownPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeDebugPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeBackupPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe Token: SeSecurityPrivilege 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1692 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 32 PID 1936 wrote to memory of 1692 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 32 PID 1936 wrote to memory of 1692 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 32 PID 1936 wrote to memory of 1692 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 32 PID 1936 wrote to memory of 1692 1936 2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe 32 PID 1692 wrote to memory of 2544 1692 A821.tmp 33 PID 1692 wrote to memory of 2544 1692 A821.tmp 33 PID 1692 wrote to memory of 2544 1692 A821.tmp 33 PID 1692 wrote to memory of 2544 1692 A821.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-04_76ea46162624e381904f97abdf37a9e8_darkside.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\ProgramData\A821.tmp"C:\ProgramData\A821.tmp"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\A821.tmp >> NUL3⤵
- System Location Discovery: System Language Discovery
PID:2544
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x14c1⤵PID:2708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5c53aa40917e3775f9b9bf0e4ab222983
SHA1e74f0ef8a18e210ee7c68182598bb9359f0e455f
SHA256a89369f5546f10ca466994feb32380514eac9317db818e237d62568327539381
SHA5121563853fddc38d7d8c9c0bc4e6926e3884865ce2c3591ddd3e2899a958d3f30acdddaf75689f1dcdf2f1be7dce53577f116e8e8b29f3adc4319fb8610409e40c
-
Filesize
6KB
MD5dd746ace17e44ace00885b91400f11d5
SHA14a0302d2dca400598f396e4230fdae71779cbeaa
SHA256b27c3c8a30faf7c76483b7e5d964ae85046a9713caa46508ee7a1e31b7dc6272
SHA5128ac26aa7262fdf1afdc74e604720a79ebde076c75f460d7d5f57ff4d81dedb1ad471eb114ddd428c1934029746f5c222339090680bc77a6ea09ce329e1da3ef1
-
Filesize
153KB
MD53220dbfbe3a2bd8255a2adb266814ebe
SHA1df5288a4037a30a845a61f5e6ff21f1b7c085c1a
SHA2569979584d74f066443a4d1859afe70f139a11c2fdf25f9f725450b2ca636dbebc
SHA512dc2a4ff49782214a43b9da1b566820c8d4d8a51d0b3dfd07b9c4dfaa49e52ea8e6bb0d74e9a766ba4c0483c9e6cf43d5225d848bcc0f0baf6d7a606933631877
-
Filesize
129B
MD52f7ed93526e0cb2d6c4ff59e1a025a8d
SHA1badb63601b15c41b73cb70dc9e843b543abf4519
SHA256d9a596db7e6364a2695b8213e08c0e158973c53e0cc44b922a80cb343111e28d
SHA512fd4a41230908e872b1e3ec76b18ec89168cf55bea638ca9c98d97d1b7c2e21d74f1c5c3fccb15394029a2d23b8a6d9d2117fb50a8c0dc822d915a6134f1c02c0
-
Filesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf