b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
78KB
24-10-2021 15:24
behavioral2
5e2a1323dbf28eac8b3f4df9cb4f2d45
af77a09387df4ec967a8314ba0f93da0ef8e57ee
b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7
c2ba4f7458298129a8d2f1ac50640601d59086048ecc8d3d88985c31edf4014e4f4838308192ab39fb21d71a9b362a38a93edff58b570ec6f5ccfb940d871b94
Extracted
Path | C:\WRLMMTHME.README.txt |
Family | blackmatter |
Ransom Note |
~+
* +
' BLACK |
() .-.,='``'=. - o -
'=/_ \ |
* | '=._ |
\ `=./`, '
. '=.__.=' `=' *
+ Matter +
O * ' .
>>> What happens?
Your network is encrypted, and currently not operational.
We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.
>>> What guarantees?
We are not a politically motivated group and we do not need anything other than your money.
If you pay, we will provide you the programs for decryption and we will delete your data.
If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals.
We always keep our promises.
>>> How to contact with us?
1. Download and install TOR Browser (https://www.torproject.org/).
2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/O3KTUJZRE6CB4Q1OBR
>>> Warning! Recovery recommendations.
We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
|
URLs |
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/O3KTUJZRE6CB4Q1OBR |
Filter: none
-
BlackMatter Ransomware
Description
BlackMatter ransomware group claims to be Darkside and REvil succesor.
Tags
-
suricata: ET MALWARE BlackMatter CnC Domain in DNS Lookup (mojobiden .com)
Description
suricata: ET MALWARE BlackMatter CnC Domain in DNS Lookup (mojobiden .com)
Tags
-
suricata: ET MALWARE BlackMatter CnC Domain in DNS Lookup (nowautomation .com)
Description
suricata: ET MALWARE BlackMatter CnC Domain in DNS Lookup (nowautomation .com)
Tags
-
Modifies extensions of user filesb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
Description
Ransomware generally changes the extension on encrypted files.
Tags
Reported IOCs
description ioc process File opened for modification C:\Users\Admin\Pictures\DisablePop.tiff.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File renamed C:\Users\Admin\Pictures\SetRename.png => C:\Users\Admin\Pictures\SetRename.png.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File renamed C:\Users\Admin\Pictures\UnlockUnregister.png => C:\Users\Admin\Pictures\UnlockUnregister.png.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File opened for modification C:\Users\Admin\Pictures\UnlockUnregister.png.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File opened for modification C:\Users\Admin\Pictures\WriteRevoke.crw.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File opened for modification C:\Users\Admin\Pictures\DisablePop.tiff b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File renamed C:\Users\Admin\Pictures\DisablePop.tiff => C:\Users\Admin\Pictures\DisablePop.tiff.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File opened for modification C:\Users\Admin\Pictures\SetRename.png.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe File renamed C:\Users\Admin\Pictures\WriteRevoke.crw => C:\Users\Admin\Pictures\WriteRevoke.crw.WRLMMTHME b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe -
Enumerates connected drivesb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
Description
Attempts to read the root path of hard drives other than the default C: drive.
TTPs
Reported IOCs
description ioc process File opened (read-only) \??\Z: b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe -
Sets desktop wallpaper using registryb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\WRLMMTHME.bmp" b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\WRLMMTHME.bmp" b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe -
Suspicious use of NtSetInformationThreadHideFromDebuggerb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
Reported IOCs
pid process 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe -
Modifies Control Panelb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
Tags
Reported IOCs
description ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\International b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\Desktop b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Control Panel\Desktop\WallpaperStyle = "10" b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe -
Suspicious behavior: EnumeratesProcessesb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe
Reported IOCs
pid process 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe -
Suspicious use of AdjustPrivilegeTokenb4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exevssvc.exe
Reported IOCs
description pid process Token: SeBackupPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeDebugPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: 36 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeImpersonatePrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeIncBasePriorityPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeIncreaseQuotaPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: 33 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeManageVolumePrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeProfSingleProcessPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeRestorePrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeSecurityPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeSystemProfilePrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeTakeOwnershipPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeShutdownPrivilege 2684 b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe Token: SeBackupPrivilege 3044 vssvc.exe Token: SeRestorePrivilege 3044 vssvc.exe Token: SeAuditPrivilege 3044 vssvc.exe
-
C:\Users\Admin\AppData\Local\Temp\b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe"C:\Users\Admin\AppData\Local\Temp\b4b9fdf30c017af1a8a3375218e43073117690a71c3f00ac5f6361993471e5e7.exe"Modifies extensions of user filesEnumerates connected drivesSets desktop wallpaper using registrySuspicious use of NtSetInformationThreadHideFromDebuggerModifies Control PanelSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeSuspicious use of AdjustPrivilegeToken
-
memory/2684-115-0x0000000000E00000-0x0000000000F4A000-memory.dmp
-
memory/2684-116-0x0000000000E00000-0x0000000000F4A000-memory.dmp