Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
03-11-2021 13:49
Static task
static1
Behavioral task
behavioral1
Sample
4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps1
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps1
Resource
win10-en-20211014
General
-
Target
4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps1
-
Size
802KB
-
MD5
3721485def21e7efbb418b3502ebc000
-
SHA1
6ce90543099f44f06b9151524c22e497777ed026
-
SHA256
4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9
-
SHA512
a0a8508afe73cf442c54adaa504e61d106127daa39f61a7400c773e0d21512eaff5c4a93c9497bf3f207aa0be3c48f212c03c6f53f212b89bf7783e7a032c211
Malware Config
Extracted
C:\WRLMMTHME.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/24HUMRRAZYQNDJ8A
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exeflow pid process 25 1992 powershell.exe 26 1992 powershell.exe 27 1992 powershell.exe 28 1992 powershell.exe -
Modifies extensions of user files 32 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
powershell.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\SplitWrite.raw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\StepRequest.tiff.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\LimitImport.tif => C:\Users\Admin\Pictures\LimitImport.tif.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\SplitStop.png => C:\Users\Admin\Pictures\SplitStop.png.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\GroupBackup.raw => C:\Users\Admin\Pictures\GroupBackup.raw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\RegisterLock.tiff powershell.exe File opened for modification C:\Users\Admin\Pictures\RegisterLock.tiff.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\SelectReset.tiff => C:\Users\Admin\Pictures\SelectReset.tiff.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\StepRequest.tiff => C:\Users\Admin\Pictures\StepRequest.tiff.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\SubmitInstall.crw.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\ClearEnable.tiff => C:\Users\Admin\Pictures\ClearEnable.tiff.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\CloseUnpublish.tif => C:\Users\Admin\Pictures\CloseUnpublish.tif.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\WriteExit.raw => C:\Users\Admin\Pictures\WriteExit.raw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\GroupBackup.raw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\InstallTest.raw.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\ResolveTrace.crw => C:\Users\Admin\Pictures\ResolveTrace.crw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\ResolveTrace.crw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\SplitStop.png.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\ClearEnable.tiff.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\CloseUnpublish.tif.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\ApproveEnter.png.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\StepRequest.tiff powershell.exe File renamed C:\Users\Admin\Pictures\SplitWrite.raw => C:\Users\Admin\Pictures\SplitWrite.raw.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\InstallTest.raw => C:\Users\Admin\Pictures\InstallTest.raw.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\SelectReset.tiff.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\WriteExit.raw.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\RegisterLock.tiff => C:\Users\Admin\Pictures\RegisterLock.tiff.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\SelectReset.tiff powershell.exe File opened for modification C:\Users\Admin\Pictures\ClearEnable.tiff powershell.exe File renamed C:\Users\Admin\Pictures\SubmitInstall.crw => C:\Users\Admin\Pictures\SubmitInstall.crw.WRLMMTHME powershell.exe File renamed C:\Users\Admin\Pictures\ApproveEnter.png => C:\Users\Admin\Pictures\ApproveEnter.png.WRLMMTHME powershell.exe File opened for modification C:\Users\Admin\Pictures\LimitImport.tif.WRLMMTHME powershell.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
powershell.exedescription ioc process File opened (read-only) \??\Z: powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
powershell.exepid process 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
powershell.exepowershell.exepid process 2668 powershell.exe 2668 powershell.exe 2668 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe 1992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
Processes:
powershell.exepowershell.exevssvc.exedescription pid process Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: SeBackupPrivilege 1992 powershell.exe Token: SeDebugPrivilege 1992 powershell.exe Token: 36 1992 powershell.exe Token: SeImpersonatePrivilege 1992 powershell.exe Token: SeIncBasePriorityPrivilege 1992 powershell.exe Token: SeIncreaseQuotaPrivilege 1992 powershell.exe Token: 33 1992 powershell.exe Token: SeManageVolumePrivilege 1992 powershell.exe Token: SeProfSingleProcessPrivilege 1992 powershell.exe Token: SeRestorePrivilege 1992 powershell.exe Token: SeSecurityPrivilege 1992 powershell.exe Token: SeSystemProfilePrivilege 1992 powershell.exe Token: SeTakeOwnershipPrivilege 1992 powershell.exe Token: SeShutdownPrivilege 1992 powershell.exe Token: SeBackupPrivilege 3328 vssvc.exe Token: SeRestorePrivilege 3328 vssvc.exe Token: SeAuditPrivilege 3328 vssvc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
powershell.exedescription pid process target process PID 2668 wrote to memory of 1992 2668 powershell.exe powershell.exe PID 2668 wrote to memory of 1992 2668 powershell.exe powershell.exe PID 2668 wrote to memory of 1992 2668 powershell.exe powershell.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -ex bypass -NonI C:\Users\Admin\AppData\Local\Temp\4524784688e60313b8fefdebde441ca447c1330d90b86885fb55d099071c6ec9.ps12⤵
- Blocklisted process makes network request
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
78b9754143f8cc8c9366ebf1722656f2
SHA1e5f8a816261c9e17a5d1401da9f79ad62ae4f578
SHA256be761887475622415f69ace9fe521fde1a6d4879ce40405ff562e1e63661cf01
SHA512d35afd4fe81ac9b223df7e0a69593f9826d66b90a67c387ab18e89f6f82dc2bdee94a8c0f97558872e8a94821e29102949bbed027de73f227abca700ac005c0e
-
memory/1992-172-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/1992-173-0x00000000072B0000-0x00000000072B1000-memory.dmpFilesize
4KB
-
memory/1992-171-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/1992-437-0x000000000ACE0000-0x000000000B358000-memory.dmpFilesize
6.5MB
-
memory/1992-436-0x000000000ACE0000-0x000000000B358000-memory.dmpFilesize
6.5MB
-
memory/1992-435-0x0000000007316000-0x0000000007318000-memory.dmpFilesize
8KB
-
memory/1992-221-0x0000000007313000-0x0000000007314000-memory.dmpFilesize
4KB
-
memory/1992-220-0x000000007F7F0000-0x000000007F7F1000-memory.dmpFilesize
4KB
-
memory/1992-185-0x0000000004DB0000-0x0000000004DB1000-memory.dmpFilesize
4KB
-
memory/1992-175-0x0000000007310000-0x0000000007311000-memory.dmpFilesize
4KB
-
memory/1992-184-0x0000000008B80000-0x0000000008B81000-memory.dmpFilesize
4KB
-
memory/1992-183-0x0000000008690000-0x0000000008691000-memory.dmpFilesize
4KB
-
memory/1992-182-0x0000000008670000-0x0000000008671000-memory.dmpFilesize
4KB
-
memory/1992-180-0x00000000082E0000-0x00000000082E1000-memory.dmpFilesize
4KB
-
memory/1992-143-0x0000000000000000-mapping.dmp
-
memory/1992-179-0x0000000008090000-0x0000000008091000-memory.dmpFilesize
4KB
-
memory/1992-178-0x0000000008270000-0x0000000008271000-memory.dmpFilesize
4KB
-
memory/1992-177-0x0000000007FF0000-0x0000000007FF1000-memory.dmpFilesize
4KB
-
memory/1992-176-0x0000000007312000-0x0000000007313000-memory.dmpFilesize
4KB
-
memory/1992-174-0x0000000007950000-0x0000000007951000-memory.dmpFilesize
4KB
-
memory/2668-125-0x0000020220360000-0x0000020220361000-memory.dmpFilesize
4KB
-
memory/2668-117-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-119-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-118-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-170-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-129-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-116-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-128-0x000002021E1D6000-0x000002021E1D8000-memory.dmpFilesize
8KB
-
memory/2668-127-0x000002021E1D3000-0x000002021E1D5000-memory.dmpFilesize
8KB
-
memory/2668-126-0x000002021E1D0000-0x000002021E1D2000-memory.dmpFilesize
8KB
-
memory/2668-124-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-123-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-121-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-122-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB
-
memory/2668-120-0x00000202201B0000-0x00000202201B1000-memory.dmpFilesize
4KB
-
memory/2668-115-0x0000020204200000-0x0000020204202000-memory.dmpFilesize
8KB