Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en -
submitted
02-09-2021 17:23
Static task
static1
Behavioral task
behavioral1
Sample
RIJXROV.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
RIJXROV.exe
Resource
win10-en
General
-
Target
RIJXROV.exe
-
Size
79KB
-
MD5
18c7c940bc6a4e778fbdf4a3e28151a8
-
SHA1
f3589918d71b87c7e764479b79c4a7b485cb746a
-
SHA256
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2
-
SHA512
6e808fe882640a517c2054fdece73059c7ea3e27a946e55f41b91fd0f757dcd8c76be8f381f60f3e45449edebaa4f620b903337727607f7768543b1acec40d18
Malware Config
Extracted
C:\YvGHBQWH8.README.txt
blackmatter
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\DisableDebug.tiff.YvGHBQWH8 RIJXROV.exe File renamed C:\Users\Admin\Pictures\RepairSet.crw => C:\Users\Admin\Pictures\RepairSet.crw.YvGHBQWH8 RIJXROV.exe File renamed C:\Users\Admin\Pictures\AssertCopy.tiff => C:\Users\Admin\Pictures\AssertCopy.tiff.YvGHBQWH8 RIJXROV.exe File renamed C:\Users\Admin\Pictures\ConvertToUpdate.raw => C:\Users\Admin\Pictures\ConvertToUpdate.raw.YvGHBQWH8 RIJXROV.exe File opened for modification C:\Users\Admin\Pictures\ConvertToUpdate.raw.YvGHBQWH8 RIJXROV.exe File opened for modification C:\Users\Admin\Pictures\DisableDebug.tiff RIJXROV.exe File renamed C:\Users\Admin\Pictures\DisableDebug.tiff => C:\Users\Admin\Pictures\DisableDebug.tiff.YvGHBQWH8 RIJXROV.exe File opened for modification C:\Users\Admin\Pictures\RepairSet.crw.YvGHBQWH8 RIJXROV.exe File opened for modification C:\Users\Admin\Pictures\AssertCopy.tiff RIJXROV.exe File opened for modification C:\Users\Admin\Pictures\AssertCopy.tiff.YvGHBQWH8 RIJXROV.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\YvGHBQWH8.bmp" RIJXROV.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\YvGHBQWH8.bmp" RIJXROV.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1960 RIJXROV.exe 1960 RIJXROV.exe 1960 RIJXROV.exe 1960 RIJXROV.exe 1960 RIJXROV.exe 1960 RIJXROV.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Control Panel\International RIJXROV.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Control Panel\Desktop RIJXROV.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Control Panel\Desktop\WallpaperStyle = "10" RIJXROV.exe -
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 splwow64.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 splwow64.exe Set value (int) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff splwow64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" splwow64.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" splwow64.exe Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_Classes\Local Settings splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff splwow64.exe Set value (data) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots splwow64.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1728 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1960 RIJXROV.exe 1960 RIJXROV.exe 1960 RIJXROV.exe 1960 RIJXROV.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 692 splwow64.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1960 RIJXROV.exe Token: SeDebugPrivilege 1960 RIJXROV.exe Token: 36 1960 RIJXROV.exe Token: SeImpersonatePrivilege 1960 RIJXROV.exe Token: SeIncBasePriorityPrivilege 1960 RIJXROV.exe Token: SeIncreaseQuotaPrivilege 1960 RIJXROV.exe Token: 33 1960 RIJXROV.exe Token: SeManageVolumePrivilege 1960 RIJXROV.exe Token: SeProfSingleProcessPrivilege 1960 RIJXROV.exe Token: SeRestorePrivilege 1960 RIJXROV.exe Token: SeSecurityPrivilege 1960 RIJXROV.exe Token: SeSystemProfilePrivilege 1960 RIJXROV.exe Token: SeTakeOwnershipPrivilege 1960 RIJXROV.exe Token: SeShutdownPrivilege 1960 RIJXROV.exe Token: SeBackupPrivilege 1320 vssvc.exe Token: SeRestorePrivilege 1320 vssvc.exe Token: SeAuditPrivilege 1320 vssvc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 692 splwow64.exe 692 splwow64.exe 692 splwow64.exe 692 splwow64.exe 692 splwow64.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1960 wrote to memory of 1728 1960 RIJXROV.exe 37 PID 1960 wrote to memory of 1728 1960 RIJXROV.exe 37 PID 1960 wrote to memory of 1728 1960 RIJXROV.exe 37 PID 1960 wrote to memory of 1728 1960 RIJXROV.exe 37 PID 1728 wrote to memory of 692 1728 NOTEPAD.EXE 38 PID 1728 wrote to memory of 692 1728 NOTEPAD.EXE 38 PID 1728 wrote to memory of 692 1728 NOTEPAD.EXE 38 PID 1728 wrote to memory of 692 1728 NOTEPAD.EXE 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\RIJXROV.exe"C:\Users\Admin\AppData\Local\Temp\RIJXROV.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" /p C:\YvGHBQWH8.README.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:692
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320