Analysis

  • max time kernel
    229s
  • max time network
    231s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-en
  • resource tags

    arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/04/2025, 04:27

General

  • Target

    ddn/BDDarkSideDecryptor.exe

  • Size

    9.5MB

  • MD5

    cb1b67988c63e6e951be00b3eda7f74f

  • SHA1

    049fff52f877516a756c6333d12b3c1c1cfbe519

  • SHA256

    1a72fe563f588580440da34a03b1af3ba072e66404608c521b4adbcb034a33f6

  • SHA512

    ef1d74da565026fef631f83dee70fafb661bea74cad69b70035f10700b733f64ce34b3308c0fee59222d1eb0767b87672f1f824ea923008c70a3e8be229ff289

  • SSDEEP

    196608:IdJEHHWtwPlARRmtejsum3/DBekLV58IzN6+ZR62Wi:IbEn9PlAGMivDdjxNF762W

Malware Config

Extracted

Path

C:\b98faef33da7484fae2c\README.1e2d78e0.TXT

Family

darkside

Ransom Note
----------- [ Welcome to DarkSide ] -------------> What happend? ---------------------------------------------- Your computers and servers are encrypted, backups are deleted. We use strong encryption algorithms, so you cannot decrypt your data. But you can restore everything by purchasing a special program from us - universal decryptor. This program will restore all your network. Follow our instructions below and you will recover all your data. Data leak ---------------------------------------------- First of all we have downloaded more then 500GB data from your network. Included: -Accounting data -Finance data -HR -Employees confidential data(photos, benefits, taxes, etc) -Marketing -Budgets -Taxes(sales tax compliance, property, income and franchise taxes, etc) -Payrolls -Banking data -Arbitration -Scans -Insurance -Reconciliations -Reports(monthly bank inventory, monthly financial, claims reports, etc) -Audits(DHG, insurance audits, etc) -B2B clients config data -Confidentiality 2020 -2020, 2021 Business plans -2019, 2020, 2021 years Closing (full dumps) -and a lot of other sensitive data Your personal leak page: http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/162/thedixiegroup/LCfyHRcwffrYTblpZvoPO3XDbrYPcNu0wVAsH5p49LSjBfzTmtdXT48azXFlMu7q On the page you will find examples of files that have been downloaded. The data is preloaded and will be automatically published if you do not pay. After publication, your data will be available for at least 6 months on our tor cdn servers. We are ready: - To provide you the evidence of stolen data - To delete all the stolen data. What guarantees? ---------------------------------------------- We value our reputation. If we do not do our work and liabilities, nobody will pay us. This is not in our interests. All our decryption software is perfectly tested and will decrypt your data. We will also provide support in case of problems. We guarantee to decrypt one file for free. Go to the site and contact us. How to get access on website? ---------------------------------------------- Using a TOR browser: 1) Download and install TOR browser from this site: https://torproject.org/ 2) Open our website: http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/W57MRI9C7YZJUZEABBBYRQLSUTG22JZ9MAH0WT1ISHC405KP7Z2UWY3AI3J68DNM When you open our website, put the following data in the input form: Key: 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 !!! DANGER !!! DO NOT MODIFY or try to RECOVER any files yourself. We WILL NOT be able to RESTORE them. !!! DANGER !!!
URLs

http://darksidc3iux462n6yunevoag52ntvwp6wulaz3zirkmh4cnz6hhj7id.onion/162/thedixiegroup/LCfyHRcwffrYTblpZvoPO3XDbrYPcNu0wVAsH5p49LSjBfzTmtdXT48azXFlMu7q

http://dark24zz36xm4y2phwe7yvnkkkkhxionhfrwp67awpb3r3bdcneivoqd.onion/W57MRI9C7YZJUZEABBBYRQLSUTG22JZ9MAH0WT1ISHC405KP7Z2UWY3AI3J68DNM

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\BDRansomDecryptor\BitdefenderLog.txt

Ransom Note
Decryptor Started at Tue Apr 8 04:31:24 2025 This utility decrypts files encrypted by several versions of DarkSide ransomware. It can also decrypt files encrypted by the Linux version (with [.darkside] extension) This tool doesn't require internet access! Preparing decryption key ... Key ready! Sending init request.

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\BDRansomDecryptor\BitdefenderLog.txt

Ransom Note
Decryptor Started at Tue Apr 8 04:31:24 2025 This utility decrypts files encrypted by several versions of DarkSide ransomware. It can also decrypt files encrypted by the Linux version (with [.darkside] extension) This tool doesn't require internet access! Preparing decryption key ... Key ready! Sending init request. Done. Decrypt Files ... Sending finish request. Done. Total decrypted files: [0] Scan finished! Decryptor Started at Tue Apr 8 04:31:39 2025 This utility decrypts files encrypted by several versions of DarkSide ransomware. It can also decrypt files encrypted by the Linux version (with [.darkside] extension) This tool doesn't require internet access! Preparing decryption key ... Key ready! Sending init request.

Signatures

  • DarkSide

    Targeted ransomware first seen in August 2020. Operators steal data to use as leverage.

  • Darkside family
  • Renames multiple (139) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 12 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 40 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ddn\BDDarkSideDecryptor.exe
    "C:\Users\Admin\AppData\Local\Temp\ddn\BDDarkSideDecryptor.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1548
    • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\RemovalToolGUI.exe
      C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\RemovalToolGUI.exe "
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:5004
  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\LockConvertFrom.vbs"
    1⤵
      PID:5108
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3556
      • C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe
        "C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        PID:324
      • C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe
        "C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe"
        1⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5440
        • C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe
          "C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe"
          2⤵
          • Drops file in System32 directory
          • Sets desktop wallpaper using registry
          • System Location Discovery: System Language Discovery
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:5132
          • C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe
            C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe -work worker0 job0-5132
            3⤵
            • Modifies data under HKEY_USERS
            • Suspicious behavior: EnumeratesProcesses
            PID:2400
          • C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe
            C:\Users\Admin\AppData\Local\Temp\Temp1_0a0c225f0e5ee941a79f2b7701f1285e4975a2859eb4d025d96d9e366e81abb9.zip\acer.exe -work worker1 job1-5132
            3⤵
            • Enumerates connected drives
            PID:1948
      • C:\Windows\system32\vssvc.exe
        C:\Windows\system32\vssvc.exe
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3204
      • C:\Users\Admin\AppData\Local\Temp\ddn\BDDarkSideDecryptor.exe
        "C:\Users\Admin\AppData\Local\Temp\ddn\BDDarkSideDecryptor.exe"
        1⤵
        • Drops desktop.ini file(s)
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:5012
        • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\RemovalToolGUI.exe
          C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\RemovalToolGUI.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:1040
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
        1⤵
          PID:4224
        • C:\Windows\System32\oobe\UserOOBEBroker.exe
          C:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding
          1⤵
          • Drops file in Windows directory
          PID:1400
        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
          1⤵
          • System Location Discovery: System Language Discovery
          PID:5712
        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe
          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding
          1⤵
          • System Location Discovery: System Language Discovery
          PID:308
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
          1⤵
            PID:3008

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\logs\Common\FileCoAuth-2025-4-8.430.5712.1.odl

            Filesize

            706B

            MD5

            4a4901ed76705540be7472b98619945e

            SHA1

            b8fb5edb60d35f4d02ffc3abf27796b510681a6e

            SHA256

            1bce66122999bcb2fbeafab4af51a7ad4c3a90723c9ecb6ad4b86b1c794e81f2

            SHA512

            fab803701187e19644ce06afeacb278ba859a6ce3bcd5f027ac72f674577b7b71ae8a4210c3fa43918aa889fd1ae39ccfb86264fd25d94e047f12eae13883952

          • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\BDRansomDecryptor\BitdefenderLog.txt

            Filesize

            666B

            MD5

            0ab94f4c59428d6706355339168b305b

            SHA1

            d6444fb27bb04c14052c74effd9ed9b5e621ea94

            SHA256

            9e9b9317f88a6687fc130b64190656bcf9d762b05d2be3e7c1d98d57f22dace6

            SHA512

            ac0f81edd9ba561065666d8cd77d1443f094a2c396e6c1163cc464b806a8af4a6e1dce8455d62a5565ff93a5b61fdb3a52714eb0ee4e0a8051da4b1a76ac7e00

          • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\BDRansomDecryptor\BitdefenderLog.txt

            Filesize

            1KB

            MD5

            92027c312a6139e77435842ed934e890

            SHA1

            73dbb68c6ef873223bd9df8132923f8a87afc716

            SHA256

            c79c4cbc75f17175356f19033e6b6fdc78af00f03fca8fdd67cd6b9541a66147

            SHA512

            516a5428988365dcf5ba6d272e96cfac3ee03acc1d5adbce07f0baf6ec7846055656e356fb74000db2173b8ec47a39f4ec21cb338389504719a4ec8039db813a

          • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\DarkSideDecryptLib.dll

            Filesize

            2.0MB

            MD5

            601e4a912e9ba1e981948c031740e97e

            SHA1

            2953868dafb5a02f9908c94227867fde307f18ef

            SHA256

            9af591339601d1805e3f527a3840950b9d3653f4d651e99d08f7a61dbb5da78d

            SHA512

            f7aebcdcf3a69dcbda5daea54b80a649261b3a18d5c65932f8bd241d3ca31c33858895aa8f675e08e25c02f8ae9bddd79dd442c35655d9a6f500006f8a5046f4

          • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\RemovalToolGUI.exe

            Filesize

            1.2MB

            MD5

            70375699fe4024ffe8413eefa6f3144b

            SHA1

            a8d51adf1e62d0465df307d064ecb26acc67258f

            SHA256

            6eb8a7b89716a71975ac07becd7785108b3f2e8ba37a9bc28859c2835bddd0df

            SHA512

            8f3074ba1a1aba0754ef9fd05ef432bd5255e39db508ca2dade9a932751c4e11fd87b82e8953fd7d6f279656a0cb30046ba93e8a35057114b9c031f272e5b75a

          • C:\Users\Admin\AppData\Local\Temp\BDRansomDecryptor\sciter.dll

            Filesize

            7.8MB

            MD5

            ea713bc436d655ac7afdb0b0b763999f

            SHA1

            a4d63919437372650c0f355ba42304db07a6bca1

            SHA256

            a18e82f09c16fad1c17a03a53d21d5b5857c29e99f0dfc6f9060499377b7c25a

            SHA512

            35da588b84ea6e1d912d68e0c9e378b13786dd2b52bc47f7e3d826f8899da2e4479997a582f4e0fbdfe72823d862b922345d8427979778a24616c9472fb4d7b3

          • C:\b98faef33da7484fae2c\README.1e2d78e0.TXT

            Filesize

            3KB

            MD5

            164aa420be8e0c2bcdef574355edaa32

            SHA1

            4336eaafedfc18a27cdf42bffad63b5a54ea8231

            SHA256

            b326d11dd90c2e4efb0a384981f71c2bd1a6faa0553d6389acb08945b699f73d

            SHA512

            fd1437bc4f45e3f4b5c3d0e7fca9383f45edceb5c8cb603d0b8ee98350a5f2468c2aabdb66f16bdee0bac49afefa4300a093a54ee43b1ff28a541ae612e34d9d

          • memory/1040-252-0x00007FFCE5820000-0x00007FFCE5A2E000-memory.dmp

            Filesize

            2.1MB

          • memory/5004-9-0x00007FFCE6610000-0x00007FFCE681E000-memory.dmp

            Filesize

            2.1MB