Analysis
-
max time kernel
90s -
max time network
108s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-10-2021 09:28
Static task
static1
Behavioral task
behavioral1
Sample
v2c.exe
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
v2c.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
v2c.exe
-
Size
95KB
-
MD5
757139e76fae876ae50dd2c3ac11d5d8
-
SHA1
1c150493014d29c1f8a51e397e527f7d7c1476c7
-
SHA256
9bae897c19f237c22b6bdc024df27455e739be24bed07ef0d409f2df87eeda58
-
SHA512
852febe5dc991fa6dc5ff994b2de18548e98a2f53de903a480ed871d9d25413159b167a3c0ff39175bbf7c339604bb1eccc2f9425415ab16089bc56e3e998974
Score
10/10
Malware Config
Extracted
Path
C:\chkvc3MvG.README.txt
Family
blackmatter
Ransom Note
~+
* +
' BLACK |
() .-.,='``'=. - o -
'=/_ \ |
* | '=._ |
\ `=./`, '
. '=.__.=' `=' *
+ Matter +
O * ' .
>>> What happens?
Your network is encrypted, and currently not operational.
We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data.
>>> What data stolen?
From your network was stolen large amount of data.
If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media.
>>> What guarantees?
We are not a politically motivated group and we do not need anything other than your money.
If you pay, we will provide you the programs for decryption and we will delete your data.
If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals.
We always keep our promises.
>> How to contact with us?
1. Download and install TOR Browser (https://www.torproject.org/).
2. Open http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/U6H6RKDF6W3B8XOWL
>> Warning! Recovery recommendations.
We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/U6H6RKDF6W3B8XOWL
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 3 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\TraceCopy.png.chkvc3MvG v2c.exe File opened for modification C:\Users\Admin\Pictures\SearchUndo.tiff v2c.exe File renamed C:\Users\Admin\Pictures\TraceCopy.png => C:\Users\Admin\Pictures\TraceCopy.png.chkvc3MvG v2c.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\chkvc3MvG.bmp" v2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\chkvc3MvG.bmp" v2c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2012 v2c.exe 2012 v2c.exe 2012 v2c.exe 2012 v2c.exe 2012 v2c.exe 2012 v2c.exe -
Modifies Control Panel 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop\WallpaperStyle = "10" v2c.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\International v2c.exe Key created \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Control Panel\Desktop v2c.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\chkvc3MvG\DefaultIcon\ = "C:\\ProgramData\\chkvc3MvG.ico" v2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chkvc3MvG v2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chkvc3MvG\ = "chkvc3MvG" v2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chkvc3MvG\DefaultIcon v2c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\chkvc3MvG v2c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2012 v2c.exe 2012 v2c.exe 2012 v2c.exe 2012 v2c.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 2012 v2c.exe Token: SeDebugPrivilege 2012 v2c.exe Token: 36 2012 v2c.exe Token: SeImpersonatePrivilege 2012 v2c.exe Token: SeIncBasePriorityPrivilege 2012 v2c.exe Token: SeIncreaseQuotaPrivilege 2012 v2c.exe Token: 33 2012 v2c.exe Token: SeManageVolumePrivilege 2012 v2c.exe Token: SeProfSingleProcessPrivilege 2012 v2c.exe Token: SeRestorePrivilege 2012 v2c.exe Token: SeSecurityPrivilege 2012 v2c.exe Token: SeSystemProfilePrivilege 2012 v2c.exe Token: SeTakeOwnershipPrivilege 2012 v2c.exe Token: SeShutdownPrivilege 2012 v2c.exe Token: SeBackupPrivilege 2020 vssvc.exe Token: SeRestorePrivilege 2020 vssvc.exe Token: SeAuditPrivilege 2020 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2c.exe"C:\Users\Admin\AppData\Local\Temp\v2c.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2020