Analysis
-
max time kernel
18s -
max time network
73s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
08-08-2021 15:31
Static task
static1
Behavioral task
behavioral1
Sample
Payload.dat.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Payload.dat.dll
Resource
win10v20210408
General
-
Target
Payload.dat.dll
-
Size
73KB
-
MD5
01aef1c692a50a9d0e0369a58b1516ff
-
SHA1
8572344f5320d4b9ea4c03c37409210a290540c0
-
SHA256
86c84c07e27cc8aba129e1cf51215b65c445f178b94f2e8c4c10e6bc110daa94
-
SHA512
abbd643dfcc25bc68983ff1c572824cfd1a2f44eff3f37c22450041aa2de31bdaace6996c55e2371040f479a9b5364bbcfbc41d6bc48e364a0433bb76e7b6f72
Malware Config
Extracted
C:\UCzUExPUL.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/RSW33BDOYPLWM78U9A09BZDI
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 18 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CloseBlock.tiff => C:\Users\Admin\Pictures\CloseBlock.tiff.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\GroupUnregister.tiff.UCzUExPUL rundll32.exe File renamed C:\Users\Admin\Pictures\RestoreDisconnect.crw => C:\Users\Admin\Pictures\RestoreDisconnect.crw.UCzUExPUL rundll32.exe File renamed C:\Users\Admin\Pictures\StopPing.raw => C:\Users\Admin\Pictures\StopPing.raw.UCzUExPUL rundll32.exe File renamed C:\Users\Admin\Pictures\UnblockDebug.raw => C:\Users\Admin\Pictures\UnblockDebug.raw.UCzUExPUL rundll32.exe File renamed C:\Users\Admin\Pictures\CheckpointRename.raw => C:\Users\Admin\Pictures\CheckpointRename.raw.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\CloseBlock.tiff.UCzUExPUL rundll32.exe File renamed C:\Users\Admin\Pictures\ConnectOut.png => C:\Users\Admin\Pictures\ConnectOut.png.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\ConnectOut.png.UCzUExPUL rundll32.exe File renamed C:\Users\Admin\Pictures\LimitSend.raw => C:\Users\Admin\Pictures\LimitSend.raw.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\RestoreDisconnect.crw.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\LimitSend.raw.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\UnblockDebug.raw.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\CheckpointRename.raw.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\CloseBlock.tiff rundll32.exe File opened for modification C:\Users\Admin\Pictures\GroupUnregister.tiff rundll32.exe File renamed C:\Users\Admin\Pictures\GroupUnregister.tiff => C:\Users\Admin\Pictures\GroupUnregister.tiff.UCzUExPUL rundll32.exe File opened for modification C:\Users\Admin\Pictures\StopPing.raw.UCzUExPUL rundll32.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\UCzUExPUL.bmp" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\UCzUExPUL.bmp" rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallpaperStyle = "10" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe 1408 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1408 rundll32.exe Token: SeDebugPrivilege 1408 rundll32.exe Token: 36 1408 rundll32.exe Token: SeImpersonatePrivilege 1408 rundll32.exe Token: SeIncBasePriorityPrivilege 1408 rundll32.exe Token: SeIncreaseQuotaPrivilege 1408 rundll32.exe Token: 33 1408 rundll32.exe Token: SeManageVolumePrivilege 1408 rundll32.exe Token: SeProfSingleProcessPrivilege 1408 rundll32.exe Token: SeRestorePrivilege 1408 rundll32.exe Token: SeSecurityPrivilege 1408 rundll32.exe Token: SeSystemProfilePrivilege 1408 rundll32.exe Token: SeTakeOwnershipPrivilege 1408 rundll32.exe Token: SeShutdownPrivilege 1408 rundll32.exe Token: SeBackupPrivilege 3756 vssvc.exe Token: SeRestorePrivilege 3756 vssvc.exe Token: SeAuditPrivilege 3756 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 652 wrote to memory of 1408 652 rundll32.exe 70 PID 652 wrote to memory of 1408 652 rundll32.exe 70 PID 652 wrote to memory of 1408 652 rundll32.exe 70
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Payload.dat.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Payload.dat.dll,#12⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3756