Analysis
-
max time kernel
146s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
01-10-2021 06:28
Static task
static1
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/WINDOWS/PREMIER.ps1
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/WINDOWS/PREMIER.ps1
Resource
win10v20210408
General
-
Target
Device/HarddiskVolume3/WINDOWS/PREMIER.ps1
-
Size
802KB
-
MD5
3721485def21e7efbb418b3502ebc000
-
SHA1
6ce90543099f44f06b9151524c22e497777ed026
-
SHA256
4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9
-
SHA512
a0a8508afe73cf442c54adaa504e61d106127daa39f61a7400c773e0d21512eaff5c4a93c9497bf3f207aa0be3c48f212c03c6f53f212b89bf7783e7a032c211
Malware Config
Extracted
C:\UCzUExPUL.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/24HUMRRAZYQNDJ8A
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 14 1524 powershell.exe 16 1524 powershell.exe 18 1524 powershell.exe 20 1524 powershell.exe 21 1524 powershell.exe -
Modifies extensions of user files 20 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\SplitRedo.png.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\StopEdit.raw.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\CompleteDisconnect.tiff.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\CopyReset.raw => C:\Users\Admin\Pictures\CopyReset.raw.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\CopyReset.raw.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\MergeUnregister.tiff => C:\Users\Admin\Pictures\MergeUnregister.tiff.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\SplitRedo.png => C:\Users\Admin\Pictures\SplitRedo.png.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\StopEdit.raw => C:\Users\Admin\Pictures\StopEdit.raw.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\CompleteDisconnect.tiff => C:\Users\Admin\Pictures\CompleteDisconnect.tiff.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\MergeUnregister.tiff powershell.exe File opened for modification C:\Users\Admin\Pictures\MergeUnregister.tiff.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\ResolveRegister.tif => C:\Users\Admin\Pictures\ResolveRegister.tif.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\RestartEdit.raw.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\BlockConvert.png => C:\Users\Admin\Pictures\BlockConvert.png.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\BlockConvert.png.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\CompleteDisconnect.tiff powershell.exe File renamed C:\Users\Admin\Pictures\JoinOut.tif => C:\Users\Admin\Pictures\JoinOut.tif.UCzUExPUL powershell.exe File renamed C:\Users\Admin\Pictures\RestartEdit.raw => C:\Users\Admin\Pictures\RestartEdit.raw.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\JoinOut.tif.UCzUExPUL powershell.exe File opened for modification C:\Users\Admin\Pictures\ResolveRegister.tif.UCzUExPUL powershell.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: powershell.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\UCzUExPUL.bmp" powershell.exe Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\UCzUExPUL.bmp" powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 808 powershell.exe 808 powershell.exe 808 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe 1524 powershell.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeDebugPrivilege 808 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: SeBackupPrivilege 1524 powershell.exe Token: SeDebugPrivilege 1524 powershell.exe Token: 36 1524 powershell.exe Token: SeImpersonatePrivilege 1524 powershell.exe Token: SeIncBasePriorityPrivilege 1524 powershell.exe Token: SeIncreaseQuotaPrivilege 1524 powershell.exe Token: 33 1524 powershell.exe Token: SeManageVolumePrivilege 1524 powershell.exe Token: SeProfSingleProcessPrivilege 1524 powershell.exe Token: SeRestorePrivilege 1524 powershell.exe Token: SeSecurityPrivilege 1524 powershell.exe Token: SeSystemProfilePrivilege 1524 powershell.exe Token: SeTakeOwnershipPrivilege 1524 powershell.exe Token: SeShutdownPrivilege 1524 powershell.exe Token: SeBackupPrivilege 2728 vssvc.exe Token: SeRestorePrivilege 2728 vssvc.exe Token: SeAuditPrivilege 2728 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 808 wrote to memory of 1524 808 powershell.exe 75 PID 808 wrote to memory of 1524 808 powershell.exe 75 PID 808 wrote to memory of 1524 808 powershell.exe 75
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\WINDOWS\PREMIER.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -NonI C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\WINDOWS\PREMIER.ps12⤵
- Blocklisted process makes network request
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2728