Analysis

  • max time kernel
    120s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    19-10-2021 13:57

General

  • Target

    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe

  • Size

    80KB

  • MD5

    5c66cd4f21254f83663819138e634dd9

  • SHA1

    6626cae85970e6490b8b0bf9da9aa4b57a79bb62

  • SHA256

    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c

  • SHA512

    093e1fb491d73ee240f1b0084bda233ef272618b56e61ed8602a57dec7b241b3f80a4a1749ff46d141399e71dd6127c9a8893c9d8d24c6aa48b0479a7ab42a2a

Malware Config

Extracted

Path

C:\AVx2lZV2X.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen sensitive data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/EWX33VYY3IGOXSG5ZZ2 >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/EWX33VYY3IGOXSG5ZZ2

Signatures

  • BlackMatter Ransomware

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • suricata: ET MALWARE BlackMatter CnC Activity

    suricata: ET MALWARE BlackMatter CnC Activity

  • Modifies extensions of user files 19 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe"
    1⤵
    • Modifies extensions of user files
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2472
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1464

Network

  • flag-us
    DNS
    fluentzip.org
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    Remote address:
    8.8.8.8:53
    Request
    fluentzip.org
    IN A
    Response
    fluentzip.org
    IN A
    5.39.3.130
  • flag-fr
    POST
    https://fluentzip.org/?MI6x=iMStP1gG70&za6=
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    Remote address:
    5.39.3.130:443
    Request
    POST /?MI6x=iMStP1gG70&za6= HTTP/1.1
    Accept: */*
    Connection: keep-alive
    Accept-Encoding: gzip, deflate, br
    Content-Type: text/plain
    User-Agent: Edge/91.0.864.37
    Host: fluentzip.org
    Content-Length: 791
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Tue, 19 Oct 2021 13:58:08 GMT
    Content-Type: application/json; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
  • flag-fr
    POST
    https://fluentzip.org/?KMM5kK9Su=JVi0ITpkDM0pIS&o=J9LoBBRMZT0&ZT8uUg2h=t9guW&Gz=ECKU0LZ2wcKUxsOe4LSJ&F=SPXa2y8LPCeYpmvGJr0f&wEjzU=glaqAoHaT2Yt&oeVTsjM=Gnk&mXv=zmf8IDfc1fQNGt1aK0&XVdbz=EdiJpy&wcuGdSoyuk=LfbImia0XIZjBd&66dH=Tr62oshXZx7t6hEHUM&wPGy=zkyxitaZ6ybUJMCX&hP3S2NQCKP=nVQ&mPF1oTkSZ1=rw7PG6
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    Remote address:
    5.39.3.130:443
    Request
    POST /?KMM5kK9Su=JVi0ITpkDM0pIS&o=J9LoBBRMZT0&ZT8uUg2h=t9guW&Gz=ECKU0LZ2wcKUxsOe4LSJ&F=SPXa2y8LPCeYpmvGJr0f&wEjzU=glaqAoHaT2Yt&oeVTsjM=Gnk&mXv=zmf8IDfc1fQNGt1aK0&XVdbz=EdiJpy&wcuGdSoyuk=LfbImia0XIZjBd&66dH=Tr62oshXZx7t6hEHUM&wPGy=zkyxitaZ6ybUJMCX&hP3S2NQCKP=nVQ&mPF1oTkSZ1=rw7PG6 HTTP/1.1
    Accept: */*
    Connection: keep-alive
    Accept-Encoding: gzip, deflate, br
    Content-Type: text/plain
    User-Agent: Chrome/91.0.4472.77
    Host: fluentzip.org
    Content-Length: 506
    Cache-Control: no-cache
    Response
    HTTP/1.1 200 OK
    Server: nginx
    Date: Tue, 19 Oct 2021 13:58:09 GMT
    Content-Type: application/json; charset=UTF-8
    Transfer-Encoding: chunked
    Connection: keep-alive
  • flag-us
    DNS
    time.windows.com
    Remote address:
    8.8.8.8:53
    Request
    time.windows.com
    IN A
    Response
    time.windows.com
    IN CNAME
    time.microsoft.akadns.net
    time.microsoft.akadns.net
    IN A
    20.101.57.9
  • 5.39.3.130:443
    https://fluentzip.org/?MI6x=iMStP1gG70&za6=
    tls, http
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    1.9kB
    5.1kB
    13
    9

    HTTP Request

    POST https://fluentzip.org/?MI6x=iMStP1gG70&za6=

    HTTP Response

    200
  • 5.39.3.130:443
    https://fluentzip.org/?KMM5kK9Su=JVi0ITpkDM0pIS&o=J9LoBBRMZT0&ZT8uUg2h=t9guW&Gz=ECKU0LZ2wcKUxsOe4LSJ&F=SPXa2y8LPCeYpmvGJr0f&wEjzU=glaqAoHaT2Yt&oeVTsjM=Gnk&mXv=zmf8IDfc1fQNGt1aK0&XVdbz=EdiJpy&wcuGdSoyuk=LfbImia0XIZjBd&66dH=Tr62oshXZx7t6hEHUM&wPGy=zkyxitaZ6ybUJMCX&hP3S2NQCKP=nVQ&mPF1oTkSZ1=rw7PG6
    tls, http
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    1.6kB
    622 B
    8
    6

    HTTP Request

    POST https://fluentzip.org/?KMM5kK9Su=JVi0ITpkDM0pIS&o=J9LoBBRMZT0&ZT8uUg2h=t9guW&Gz=ECKU0LZ2wcKUxsOe4LSJ&F=SPXa2y8LPCeYpmvGJr0f&wEjzU=glaqAoHaT2Yt&oeVTsjM=Gnk&mXv=zmf8IDfc1fQNGt1aK0&XVdbz=EdiJpy&wcuGdSoyuk=LfbImia0XIZjBd&66dH=Tr62oshXZx7t6hEHUM&wPGy=zkyxitaZ6ybUJMCX&hP3S2NQCKP=nVQ&mPF1oTkSZ1=rw7PG6

    HTTP Response

    200
  • 8.8.8.8:53
    fluentzip.org
    dns
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.bin.sample.exe
    59 B
    75 B
    1
    1

    DNS Request

    fluentzip.org

    DNS Response

    5.39.3.130

  • 8.8.8.8:53
    time.windows.com
    dns
    62 B
    117 B
    1
    1

    DNS Request

    time.windows.com

    DNS Response

    20.101.57.9

  • 20.101.57.9:123
    time.windows.com
    ntp
    152 B
    2

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2472-115-0x0000000002543000-0x0000000002545000-memory.dmp

    Filesize

    8KB

  • memory/2472-116-0x0000000002540000-0x0000000002541000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.