Analysis
-
max time kernel
84s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-09-2021 12:44
Static task
static1
Behavioral task
behavioral1
Sample
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
Resource
win10v20210408
General
-
Target
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe
-
Size
79KB
-
MD5
18b2fb7ecd32c80dc111eabfd58fc575
-
SHA1
d91e95182e554b7eb39b20c7876b610c15bcac1a
-
SHA256
cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163
-
SHA512
44b43b8409de6a5827cb789261518c6d916c244599ea42e6b04965e4da8e5463e2bd70f80a444a2dfc5fd6b459f52c5023b2fd080aa8fbb1eea8f6d521071ad3
Malware Config
Extracted
C:\UCzUExPUL.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/5PBOYRSETHVDBDPTL
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 13 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\DisableClose.tiff cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\DisableClose.tiff => C:\Users\Admin\Pictures\DisableClose.tiff.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\DisableClose.tiff.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\ReceiveCompress.tif => C:\Users\Admin\Pictures\ReceiveCompress.tif.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\ReceiveCompress.tif.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\RenameRemove.tiff => C:\Users\Admin\Pictures\RenameRemove.tiff.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\StepGroup.tiff.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\ConvertToUnregister.png => C:\Users\Admin\Pictures\ConvertToUnregister.png.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\RenameRemove.tiff cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\RenameRemove.tiff.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\StepGroup.tiff cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File renamed C:\Users\Admin\Pictures\StepGroup.tiff => C:\Users\Admin\Pictures\StepGroup.tiff.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\ConvertToUnregister.png.UCzUExPUL cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\UCzUExPUL.bmp" cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\UCzUExPUL.bmp" cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallpaperStyle = "10" cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeDebugPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: 36 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeImpersonatePrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeIncBasePriorityPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeIncreaseQuotaPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: 33 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeManageVolumePrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeProfSingleProcessPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeRestorePrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeSecurityPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeSystemProfilePrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeTakeOwnershipPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeShutdownPrivilege 3128 cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe Token: SeBackupPrivilege 644 vssvc.exe Token: SeRestorePrivilege 644 vssvc.exe Token: SeAuditPrivilege 644 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\cb5a89a31a97f8d815776ff43f22f4fec00b32aae4f580080c7300875d991163.bin.sample.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:644