Analysis

  • max time kernel
    153s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    05-10-2021 10:29

General

  • Target

    e4a2260bcba8059207fdcc2d59841a8c4ddbe39b6b835feef671bceb95cd232d.exe

  • Size

    79KB

  • MD5

    5de71f0e1ad0e2c2968153809ffaff05

  • SHA1

    f023f314327acd96cd8a0f8e32451b2d2dee61d0

  • SHA256

    e4a2260bcba8059207fdcc2d59841a8c4ddbe39b6b835feef671bceb95cd232d

  • SHA512

    2fce4fbdf3bc7e0dfa9cc90581c08ea6578522c65891e12359bd464b1ea007006979491b9049e4a20fabd196bf321275cc003d537236c2bd5bf8826f85543c05

Score
10/10

Malware Config

Extracted

Path

C:\1rWCqamCt.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen 250 GB of data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. Blog post link: http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79 >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T

Signatures

  • BlackMatter Ransomware

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Modifies extensions of user files 6 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 3 IoCs
  • Modifies registry class 20 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a2260bcba8059207fdcc2d59841a8c4ddbe39b6b835feef671bceb95cd232d.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a2260bcba8059207fdcc2d59841a8c4ddbe39b6b835feef671bceb95cd232d.exe"
    1⤵
    • Modifies extensions of user files
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\SysWOW64\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" /p C:\1rWCqamCt.README.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:860
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1372

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1rWCqamCt.README.txt
    MD5

    b7f54f12f8d46188c98172cf6c39f91e

    SHA1

    73f9572f52d54b2cffb8e4464f28453bc3d192b9

    SHA256

    dedefcd61e8ed1e5a7c8a9469aad4605042ce2eb69c2b20cf6e1ed9b8a14f56d

    SHA512

    2f0f138db798902990fb4c4cd4f05c66f656a7aef5aa186bad17a39683973c98da392b5207d9ba654a6e2774d920bbf2afea996513e91d159cb87961548374d5

  • C:\Users\Admin\Documents\GetSuspend.xps.1rWCqamCt
    MD5

    1dad6e8e7e45e6214c61ddb96d793174

    SHA1

    44db3f75ab404023e0641c73054f13bf20893b62

    SHA256

    69e37366b80d04e76f8387de20ae20118649af89377ba971f8180704baf89853

    SHA512

    7264234a245a8a3fd49bdd1b5917aacb7400724d3675bec30528f0bf707d72c9cbdf0a91923e10378b64bf7bc1c6ad272398795850ef1ea1eb52dcbada0dbb86

  • C:\Users\Admin\Documents\UnprotectCopy.xps.1rWCqamCt
    MD5

    1781ab0a0ac2d51917ee06503bd2d9dc

    SHA1

    84d642df6aff81e845766bbadff59beb1706b5eb

    SHA256

    15375a32a778d939c318c1a603f9fb08384405571191f6aeeccf53548698b16c

    SHA512

    e5d45145b772dcd39fb42db8143013604b158fca5b9f452ac95c11bfbd34e5dccdbf804faec5df3122d8ee92c4ed6f1e153971710c9c3e35da09243a1003b9ea

  • memory/860-67-0x0000000000000000-mapping.dmp
  • memory/860-68-0x000007FEFB761000-0x000007FEFB763000-memory.dmp
    Filesize

    8KB

  • memory/860-71-0x00000000040E0000-0x00000000040E1000-memory.dmp
    Filesize

    4KB

  • memory/1020-64-0x0000000000000000-mapping.dmp
  • memory/1304-60-0x0000000075AD1000-0x0000000075AD3000-memory.dmp
    Filesize

    8KB

  • memory/1304-61-0x0000000000865000-0x0000000000876000-memory.dmp
    Filesize

    68KB

  • memory/1304-62-0x0000000000860000-0x0000000000861000-memory.dmp
    Filesize

    4KB

  • memory/1304-63-0x0000000000876000-0x0000000000877000-memory.dmp
    Filesize

    4KB