Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20210916
  • submitted
    20-09-2021 12:44

General

  • Target

    d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767.bin.sample.exe

  • Size

    79KB

  • MD5

    2c4a733c7eb5b67e02046345d844879d

  • SHA1

    a975d15879946ee827be5a5f7ffcf5bc60c93d71

  • SHA256

    d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767

  • SHA512

    6d3f8f111752fa722a02f231b5d40edc19d14dccf26c32ebb9fe1fde5e4e889a2562c9049476679a18dafaddaf0287e5ba2dff7ef9055a31f36eeeb41019025c

Score
10/10

Malware Config

Extracted

Path

C:\SykSKioSK.README.txt

Family

blackmatter

Ransom Note ~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen 250 GB of data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. Blog post link: http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79 >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T

Signatures

  • BlackMatter Ransomware

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Modifies extensions of user files ⋅ 7 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry ⋅ 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger ⋅ 6 IoCs
  • Enumerates physical storage devices ⋅ 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel ⋅ 3 IoCs
  • Modifies registry class ⋅ 20 IoCs
  • Opens file in notepad (likely ransom note) ⋅ 1 IoCs
  • Suspicious behavior: EnumeratesProcesses ⋅ 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam ⋅ 1 IoCs
  • Suspicious use of AdjustPrivilegeToken ⋅ 17 IoCs
  • Suspicious use of SetWindowsHookEx ⋅ 9 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\d4647619fa2dc8fef5560d1662cbee6eb7dc95298dd40edf12dd4c8ee902d767.bin.sample.exe"
    Modifies extensions of user files
    Sets desktop wallpaper using registry
    Suspicious use of NtSetInformationThreadHideFromDebugger
    Modifies Control Panel
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" /p C:\SykSKioSK.README.txt
      Opens file in notepad (likely ransom note)
      Suspicious use of WriteProcessMemory
      PID:580
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        Modifies registry class
        Suspicious behavior: GetForegroundWindowSpam
        Suspicious use of SetWindowsHookEx
        PID:824
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    Suspicious use of AdjustPrivilegeToken
    PID:1376

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

            Initial Access

              Lateral Movement

                Persistence

                  Privilege Escalation

                    Replay Monitor

                    00:00 00:00

                    Downloads

                    • C:\SykSKioSK.README.txt
                      MD5

                      b7f54f12f8d46188c98172cf6c39f91e

                      SHA1

                      73f9572f52d54b2cffb8e4464f28453bc3d192b9

                      SHA256

                      dedefcd61e8ed1e5a7c8a9469aad4605042ce2eb69c2b20cf6e1ed9b8a14f56d

                      SHA512

                      2f0f138db798902990fb4c4cd4f05c66f656a7aef5aa186bad17a39683973c98da392b5207d9ba654a6e2774d920bbf2afea996513e91d159cb87961548374d5

                    • C:\Users\Admin\Documents\ConnectOpen.xps.SykSKioSK
                      MD5

                      ada9fa7d82e45927a700e10430812a4f

                      SHA1

                      4929023d9bcad833c5eeb8ef04bb20b77be32d56

                      SHA256

                      e480cd03ee74c98d429b973b530bd03e11fb66fb79d82524aac628cff9488973

                      SHA512

                      70bf7ebf1eaa764c3e2d79152dafe5ff255358261e1b4bf4c7bce48f1020c556004be16a328e89277b76f0c9eed32ac7f04cf18210195a4271fd4bb4326f1ed5

                    • C:\Users\Admin\Documents\TraceRead.xps.SykSKioSK
                      MD5

                      2489ccbee5820906969708878cf90a9f

                      SHA1

                      7412490136e8b6f6e38c4c11a7619a7b33516074

                      SHA256

                      7048ed7f507ed6d31b0a61bb0b11a6702b7394349f61d402c6d598ab6f1e6f1d

                      SHA512

                      ece58cf40eb41497e562d45565b57ea476977f9d0ba6118699a873cdaecb4b502d47ba4802e786fc4f55a55b08f62db79e908584ce8077c2405b7066e682806c

                    • memory/580-57-0x0000000000000000-mapping.dmp
                    • memory/824-60-0x0000000000000000-mapping.dmp
                    • memory/824-61-0x000007FEFC031000-0x000007FEFC033000-memory.dmp
                    • memory/824-64-0x0000000004260000-0x0000000004261000-memory.dmp
                    • memory/980-53-0x0000000076921000-0x0000000076923000-memory.dmp
                    • memory/980-55-0x00000000003F0000-0x00000000003F1000-memory.dmp
                    • memory/980-56-0x0000000000406000-0x0000000000407000-memory.dmp
                    • memory/980-54-0x00000000003F5000-0x0000000000406000-memory.dmp