1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample

General
Target

1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

Filesize

81KB

Completed

21-09-2021 13:21

Score
10/10
MD5

5a8491587ab0f96ba141ae59365bc911

SHA1

1ab2fac4f2dc92893a9f89fc6621f66bd47cb783

SHA256

1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2

Malware Config

Extracted

Path C:\AVx2lZV2X.README.txt
Family blackmatter
Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> We downloaded over 500GB company information from all domain. Data includes: - Personal company info - Finance information - Client information - Accounting and other sensitive info; To download your data we used following shares: 015-SBE-01.mmreibc.prv MMWEB-021-01.mmreibc.prv ALTERYX-PRD-02.mmreibc.prv 511-HARRIS-OLD 002-NAS-01.mmreibc.prv 003-NAS-01.mmreibc.prv 009-NAS-01.mmreibc.prv 010-NAS-01.mmreibc.prv 012-NAS-01.mmreibc.prv 013-NAS-01.mmreibc.prv 014-NAS-01.mmreibc.prv 016-NAS-01.mmreibc.prv 020-NAS-01.mmreibc.prv 022-NAS-01.mmreibc.prv 025-NAS-01.mmreibc.prv 026-NAS-01.mmreibc.prv 028-NAS-01.mmreibc.prv 029-NAS-01.mmreibc.prv 030-NAS-01.mmreibc.prv 032-NAS-01.mmreibc.prv 033-NAS-01.mmreibc.prv 034-NAS-01.mmreibc.prv 035-NAS-01.mmreibc.prv 036-NAS-01.mmreibc.prv 037-NAS-01.mmreibc.prv 039-NAS-01.mmreibc.prv 040-NAS-01.mmreibc.prv 041-NAS-01.mmreibc.prv 042-NAS-01.mmreibc.prv 045-NAS-01.mmreibc.prv 047-NAS-01.mmreibc.prv 049-NAS-01.mmreibc.prv 051-NAS-01.mmreibc.prv 052-NAS-01.mmreibc.prv 053-NAS-01.mmreibc.prv 054-NAS-01.mmreibc.prv 055-NAS-01.mmreibc.prv 056-NAS-01.mmreibc.prv 063-NAS-01.mmreibc.prv 068-NAS-01.mmreibc.prv 070-NAS-01.mmreibc.prv 082-NAS-01.mmreibc.prv 085-NAS-01.mmreibc.prv 086-NAS-01.mmreibc.prv 093-NAS-01.mmreibc.prv 098-NAS-01.mmreibc.prv 099-NAS-01.mmreibc.prv and others. If you are not going to contact us in the next 3 days, we will prepare your data for the publications. Your personal company info will be leaked and will be in the news. This will lead to a fall of your stock. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >>> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/A9K0IM6DK7ILWAV908R3 >>> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/A9K0IM6DK7ILWAV908R3

Signatures 8

Filter: none

Defense Evasion
Discovery
Impact
  • BlackMatter Ransomware

    Description

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Modifies extensions of user files
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

    Reported IOCs

    descriptioniocprocess
    File opened for modificationC:\Users\Admin\Pictures\PublishApprove.tiff1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File renamedC:\Users\Admin\Pictures\PublishApprove.tiff => C:\Users\Admin\Pictures\PublishApprove.tiff.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File opened for modificationC:\Users\Admin\Pictures\PublishApprove.tiff.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File opened for modificationC:\Users\Admin\Pictures\SkipSplit.tiff1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File renamedC:\Users\Admin\Pictures\CheckpointPush.crw => C:\Users\Admin\Pictures\CheckpointPush.crw.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File opened for modificationC:\Users\Admin\Pictures\CheckpointPush.crw.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File renamedC:\Users\Admin\Pictures\SkipSplit.tiff => C:\Users\Admin\Pictures\SkipSplit.tiff.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File opened for modificationC:\Users\Admin\Pictures\SkipSplit.tiff.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File renamedC:\Users\Admin\Pictures\SkipDismount.crw => C:\Users\Admin\Pictures\SkipDismount.crw.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    File opened for modificationC:\Users\Admin\Pictures\SkipDismount.crw.AVx2lZV2X1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
  • Enumerates connected drives
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query RegistryPeripheral Device DiscoverySystem Information Discovery

    Reported IOCs

    descriptioniocprocess
    File opened (read-only)\??\Z:1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
  • Sets desktop wallpaper using registry
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

    Tags

    TTPs

    DefacementModify Registry

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\AVx2lZV2X.bmp"1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Set value (str)\REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\AVx2lZV2X.bmp"1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
  • Suspicious use of NtSetInformationThreadHideFromDebugger
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

    Reported IOCs

    pidprocess
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
  • Modifies Control Panel
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

    Tags

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\Desktop1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Set value (str)\REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\Desktop\WallpaperStyle = "10"1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Key created\REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Control Panel\International1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
  • Suspicious behavior: EnumeratesProcesses
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe

    Reported IOCs

    pidprocess
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
  • Suspicious use of AdjustPrivilegeToken
    1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exevssvc.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeBackupPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeDebugPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: 3624121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeImpersonatePrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeIncBasePriorityPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeIncreaseQuotaPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: 3324121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeManageVolumePrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeProfSingleProcessPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeRestorePrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeSecurityPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeSystemProfilePrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeTakeOwnershipPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeShutdownPrivilege24121eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    Token: SeBackupPrivilege3784vssvc.exe
    Token: SeRestorePrivilege3784vssvc.exe
    Token: SeAuditPrivilege3784vssvc.exe
Processes 2
  • C:\Users\Admin\AppData\Local\Temp\1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\1eea3cbd729d4493c0c0a84efe6840abf1760efe221dc971d32ca5017b5c19c2.bin.sample.exe"
    Modifies extensions of user files
    Enumerates connected drives
    Sets desktop wallpaper using registry
    Suspicious use of NtSetInformationThreadHideFromDebugger
    Modifies Control Panel
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    PID:2412
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    Suspicious use of AdjustPrivilegeToken
    PID:3784
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Execution
          Exfiltration
            Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Replay Monitor
                    00:00 00:00
                    Downloads
                    • memory/2412-115-0x0000000001153000-0x0000000001155000-memory.dmp

                    • memory/2412-116-0x0000000001150000-0x0000000001151000-memory.dmp