Analysis
-
max time kernel
148s -
max time network
133s -
platform
windows7_x64 -
resource
win7-en-20210916 -
submitted
20-09-2021 12:44
Static task
static1
Behavioral task
behavioral1
Sample
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
Resource
win10v20210408
General
-
Target
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
-
Size
79KB
-
MD5
18b2fb7ecd32c80dc111eabfd58fc575
-
SHA1
d91e95182e554b7eb39b20c7876b610c15bcac1a
-
SHA256
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163
-
SHA512
44b43b8409de6a5827cb789261518c6d916c244599ea42e6b04965e4da8e5463e2bd70f80a444a2dfc5fd6b459f52c5023b2fd080aa8fbb1eea8f6d521071ad3
Malware Config
Extracted
C:\SykSKioSK.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/5PBOYRSETHVDBDPTL
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 9 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\ResumeUninstall.png.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\UndoProtect.raw.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\OpenRead.raw.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\ResumeUninstall.png => C:\Users\Admin\Pictures\ResumeUninstall.png.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\UndoProtect.raw => C:\Users\Admin\Pictures\UndoProtect.raw.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\NewWrite.tiff cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\NewWrite.tiff => C:\Users\Admin\Pictures\NewWrite.tiff.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\OpenRead.raw => C:\Users\Admin\Pictures\OpenRead.raw.SykSKioSK cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2375386074-2889020035-839874990-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\SykSKioSK.bmp" cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2375386074-2889020035-839874990-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\SykSKioSK.bmp" cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2375386074-2889020035-839874990-1000\Control Panel\Desktop cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-2375386074-2889020035-839874990-1000\Control Panel\Desktop\WallpaperStyle = "10" cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeDebugPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: 36 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeImpersonatePrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeIncBasePriorityPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeIncreaseQuotaPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: 33 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeManageVolumePrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeProfSingleProcessPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeRestorePrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeSecurityPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeSystemProfilePrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeTakeOwnershipPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeShutdownPrivilege 2016 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeBackupPrivilege 1660 vssvc.exe Token: SeRestorePrivilege 1660 vssvc.exe Token: SeAuditPrivilege 1660 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1660