General
Target

2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe

Filesize

80KB

Completed

08-05-2022 13:04

Task

behavioral2

Score
10/10
MD5

5c66cd4f21254f83663819138e634dd9

SHA1

6626cae85970e6490b8b0bf9da9aa4b57a79bb62

SHA256

2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c

SHA512

093e1fb491d73ee240f1b0084bda233ef272618b56e61ed8602a57dec7b241b3f80a4a1749ff46d141399e71dd6127c9a8893c9d8d24c6aa48b0479a7ab42a2a

Malware Config

Extracted

Path

C:\jhmIW1uIG.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen sensitive data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/EWX33VYY3IGOXSG5ZZ2 >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/EWX33VYY3IGOXSG5ZZ2

Signatures 7

Filter: none

Defense Evasion
Impact
  • BlackMatter Ransomware

    Description

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Modifies extensions of user files
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

    Reported IOCs

    descriptioniocprocess
    File renamedC:\Users\Admin\Pictures\RestartWrite.png => C:\Users\Admin\Pictures\RestartWrite.png.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\UninstallConvertTo.tif.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\RestartWrite.png.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File renamedC:\Users\Admin\Pictures\UninstallConvertTo.tif => C:\Users\Admin\Pictures\UninstallConvertTo.tif.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File renamedC:\Users\Admin\Pictures\AddDeny.png => C:\Users\Admin\Pictures\AddDeny.png.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\AddDeny.png.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File renamedC:\Users\Admin\Pictures\LimitConfirm.tiff => C:\Users\Admin\Pictures\LimitConfirm.tiff.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File renamedC:\Users\Admin\Pictures\RequestRepair.png => C:\Users\Admin\Pictures\RequestRepair.png.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\SkipMount.tiff2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\LimitConfirm.tiff2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\LimitConfirm.tiff.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\RequestRepair.png.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File renamedC:\Users\Admin\Pictures\SkipMount.tiff => C:\Users\Admin\Pictures\SkipMount.tiff.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    File opened for modificationC:\Users\Admin\Pictures\SkipMount.tiff.jhmIW1uIG2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
  • Sets desktop wallpaper using registry
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe

    Tags

    TTPs

    DefacementModify Registry

    Reported IOCs

    descriptioniocprocess
    Set value (str)\REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\jhmIW1uIG.bmp"2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Set value (str)\REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\jhmIW1uIG.bmp"2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
  • Suspicious use of NtSetInformationThreadHideFromDebugger
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe

    Reported IOCs

    pidprocess
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
  • Modifies Control Panel
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe

    Tags

    Reported IOCs

    descriptioniocprocess
    Key created\REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\International2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Key created\REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Set value (str)\REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Control Panel\Desktop\WallpaperStyle = "10"2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
  • Suspicious behavior: EnumeratesProcesses
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe

    Reported IOCs

    pidprocess
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
  • Suspicious use of AdjustPrivilegeToken
    2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exevssvc.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeBackupPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeDebugPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: 365642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeImpersonatePrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeIncBasePriorityPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeIncreaseQuotaPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: 335642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeManageVolumePrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeProfSingleProcessPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeRestorePrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeSecurityPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeSystemProfilePrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeTakeOwnershipPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeShutdownPrivilege5642aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    Token: SeBackupPrivilege3604vssvc.exe
    Token: SeRestorePrivilege3604vssvc.exe
    Token: SeAuditPrivilege3604vssvc.exe
Processes 2
  • C:\Users\Admin\AppData\Local\Temp\2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe
    "C:\Users\Admin\AppData\Local\Temp\2aad85dbd4c79bd21c6218892552d5c9fb216293a251559ba59d45d56a01437c.exe"
    Modifies extensions of user files
    Sets desktop wallpaper using registry
    Suspicious use of NtSetInformationThreadHideFromDebugger
    Modifies Control Panel
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    PID:564
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    Suspicious use of AdjustPrivilegeToken
    PID:3604
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
        Discovery
          Execution
            Exfiltration
              Impact
              Initial Access
                Lateral Movement
                  Persistence
                    Privilege Escalation
                      Replay Monitor
                      00:00 00:00
                      Downloads