Analysis

  • max time kernel
    134s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    03-11-2021 13:49

General

  • Target

    4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps1

  • Size

    802KB

  • MD5

    3721485def21e7efbb418b3502ebc000

  • SHA1

    6ce90543099f44f06b9151524c22e497777ed026

  • SHA256

    4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9

  • SHA512

    a0a8508afe73cf442c54adaa504e61d106127daa39f61a7400c773e0d21512eaff5c4a93c9497bf3f207aa0be3c48f212c03c6f53f212b89bf7783e7a032c211

Score
10/10

Malware Config

Extracted

Path

C:\WRLMMTHME.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >>> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/24HUMRRAZYQNDJ8A >>> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/24HUMRRAZYQNDJ8A

Signatures

  • BlackMatter Ransomware

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Blocklisted process makes network request 4 IoCs
  • Modifies extensions of user files 32 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -NonI C:\Users\Admin\AppData\Local\Temp\4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps1
      2⤵
      • Blocklisted process makes network request
      • Modifies extensions of user files
      • Enumerates connected drives
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1992
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3328

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
    MD5

    78b9754143f8cc8c9366ebf1722656f2

    SHA1

    e5f8a816261c9e17a5d1401da9f79ad62ae4f578

    SHA256

    be761887475622415f69ace9fe521fde1a6d4879ce40405ff562e1e63661cf01

    SHA512

    d35afd4fe81ac9b223df7e0a69593f9826d66b90a67c387ab18e89f6f82dc2bdee94a8c0f97558872e8a94821e29102949bbed027de73f227abca700ac005c0e

  • memory/1992-172-0x0000000004DB0000-0x0000000004DB1000-memory.dmp
    Filesize

    4KB

  • memory/1992-173-0x00000000072B0000-0x00000000072B1000-memory.dmp
    Filesize

    4KB

  • memory/1992-171-0x0000000004DB0000-0x0000000004DB1000-memory.dmp
    Filesize

    4KB

  • memory/1992-437-0x000000000ACE0000-0x000000000B358000-memory.dmp
    Filesize

    6.5MB

  • memory/1992-436-0x000000000ACE0000-0x000000000B358000-memory.dmp
    Filesize

    6.5MB

  • memory/1992-435-0x0000000007316000-0x0000000007318000-memory.dmp
    Filesize

    8KB

  • memory/1992-221-0x0000000007313000-0x0000000007314000-memory.dmp
    Filesize

    4KB

  • memory/1992-220-0x000000007F7F0000-0x000000007F7F1000-memory.dmp
    Filesize

    4KB

  • memory/1992-185-0x0000000004DB0000-0x0000000004DB1000-memory.dmp
    Filesize

    4KB

  • memory/1992-175-0x0000000007310000-0x0000000007311000-memory.dmp
    Filesize

    4KB

  • memory/1992-184-0x0000000008B80000-0x0000000008B81000-memory.dmp
    Filesize

    4KB

  • memory/1992-183-0x0000000008690000-0x0000000008691000-memory.dmp
    Filesize

    4KB

  • memory/1992-182-0x0000000008670000-0x0000000008671000-memory.dmp
    Filesize

    4KB

  • memory/1992-180-0x00000000082E0000-0x00000000082E1000-memory.dmp
    Filesize

    4KB

  • memory/1992-143-0x0000000000000000-mapping.dmp
  • memory/1992-179-0x0000000008090000-0x0000000008091000-memory.dmp
    Filesize

    4KB

  • memory/1992-178-0x0000000008270000-0x0000000008271000-memory.dmp
    Filesize

    4KB

  • memory/1992-177-0x0000000007FF0000-0x0000000007FF1000-memory.dmp
    Filesize

    4KB

  • memory/1992-176-0x0000000007312000-0x0000000007313000-memory.dmp
    Filesize

    4KB

  • memory/1992-174-0x0000000007950000-0x0000000007951000-memory.dmp
    Filesize

    4KB

  • memory/2668-125-0x0000020220360000-0x0000020220361000-memory.dmp
    Filesize

    4KB

  • memory/2668-117-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-119-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-118-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-170-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-129-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-116-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-128-0x000002021E1D6000-0x000002021E1D8000-memory.dmp
    Filesize

    8KB

  • memory/2668-127-0x000002021E1D3000-0x000002021E1D5000-memory.dmp
    Filesize

    8KB

  • memory/2668-126-0x000002021E1D0000-0x000002021E1D2000-memory.dmp
    Filesize

    8KB

  • memory/2668-124-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-123-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-121-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-122-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB

  • memory/2668-120-0x00000202201B0000-0x00000202201B1000-memory.dmp
    Filesize

    4KB

  • memory/2668-115-0x0000020204200000-0x0000020204202000-memory.dmp
    Filesize

    8KB