Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20210916
  • submitted
    20-09-2021 12:44

General

  • Target

    d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767.bin.sample.exe

  • Size

    79KB

  • MD5

    2c4a733c7eb5b67e02046345d844879d

  • SHA1

    a975d15879946ee827be5a5f7ffcf5bc60c93d71

  • SHA256

    d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767

  • SHA512

    6d3f8f111752fa722a02f231b5d40edc19d14dccf26c32ebb9fe1fde5e4e889a2562c9049476679a18dafaddaf0287e5ba2dff7ef9055a31f36eeeb41019025c

Score
10/10

Malware Config

Extracted

Path

C:\SykSKioSK.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen 250 GB of data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. Blog post link: http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79 >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T

Signatures

  • BlackMatter Ransomware

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Modifies extensions of user files 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 3 IoCs
  • Modifies registry class 20 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" /p C:\SykSKioSK.README.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:824
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1376

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\SykSKioSK.README.txt
    MD5

    b7f54f12f8d46188c98172cf6c39f91e

    SHA1

    73f9572f52d54b2cffb8e4464f28453bc3d192b9

    SHA256

    dedefcd61e8ed1e5a7c8a9469aad4605042ce2eb69c2b20cf6e1ed9b8a14f56d

    SHA512

    2f0f138db798902990fb4c4cd4f05c66f656a7aef5aa186bad17a39683973c98da392b5207d9ba654a6e2774d920bbf2afea996513e91d159cb87961548374d5

  • C:\Users\Admin\Documents\ConnectOpen.xps.SykSKioSK
    MD5

    ada9fa7d82e45927a700e10430812a4f

    SHA1

    4929023d9bcad833c5eeb8ef04bb20b77be32d56

    SHA256

    e480cd03ee74c98d429b973b530bd03e11fb66fb79d82524aac628cff9488973

    SHA512

    70bf7ebf1eaa764c3e2d79152dafe5ff255358261e1b4bf4c7bce48f1020c556004be16a328e89277b76f0c9eed32ac7f04cf18210195a4271fd4bb4326f1ed5

  • C:\Users\Admin\Documents\TraceRead.xps.SykSKioSK
    MD5

    2489ccbee5820906969708878cf90a9f

    SHA1

    7412490136e8b6f6e38c4c11a7619a7b33516074

    SHA256

    7048ed7f507ed6d31b0a61bb0b11a6702b7394349f61d402c6d598ab6f1e6f1d

    SHA512

    ece58cf40eb41497e562d45565b57ea476977f9d0ba6118699a873cdaecb4b502d47ba4802e786fc4f55a55b08f62db79e908584ce8077c2405b7066e682806c

  • memory/580-57-0x0000000000000000-mapping.dmp
  • memory/824-60-0x0000000000000000-mapping.dmp
  • memory/824-61-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
    Filesize

    8KB

  • memory/824-64-0x0000000004260000-0x0000000004261000-memory.dmp
    Filesize

    4KB

  • memory/980-53-0x0000000076921000-0x0000000076923000-memory.dmp
    Filesize

    8KB

  • memory/980-55-0x00000000003F0000-0x00000000003F1000-memory.dmp
    Filesize

    4KB

  • memory/980-56-0x0000000000406000-0x0000000000407000-memory.dmp
    Filesize

    4KB

  • memory/980-54-0x00000000003F5000-0x0000000000406000-memory.dmp
    Filesize

    68KB