Analysis
-
max time kernel
72s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2022 15:45
Behavioral task
behavioral1
Sample
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe
Resource
win10v2004-20220812-en
General
-
Target
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe
-
Size
79KB
-
MD5
18c7c940bc6a4e778fbdf4a3e28151a8
-
SHA1
f3589918d71b87c7e764479b79c4a7b485cb746a
-
SHA256
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2
-
SHA512
6e808fe882640a517c2054fdece73059c7ea3e27a946e55f41b91fd0f757dcd8c76be8f381f60f3e45449edebaa4f620b903337727607f7768543b1acec40d18
-
SSDEEP
1536:+nICS4ArFnRoHhcVyid9EZZoi+zQXFpVX42N:5ZnmqVyq9EN+Mb7
Malware Config
Extracted
Path |
C:\o4h6Kyt6i.README.txt |
Family |
blackmatter |
Ransom Note | ~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What data stolen? From your network was stolen 250 GB of data. If you do not contact us we will publish all your data in our blog and will send it to the biggest mass media. Blog post link: http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79 >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T >> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them. |
URLs |
http://blackmax7su6mbwtcyo3xwtpfxpm356jjqrs34y4crcytpw7mifuedyd.onion/YdWh7oMKjT/13f1a8efc53e2fa712813f4c39147a79 http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/5AZHJFLKJNPOJ4F5O5T |
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files ⋅ 14 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\StopOut.png.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\StopResolve.raw.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File renamed C:\Users\Admin\Pictures\UndoDeny.tif => C:\Users\Admin\Pictures\UndoDeny.tif.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File renamed C:\Users\Admin\Pictures\UpdateRegister.tiff => C:\Users\Admin\Pictures\UpdateRegister.tiff.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\UpdateRegister.tiff.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\ApproveEnter.crw.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File renamed C:\Users\Admin\Pictures\ApproveEnter.crw => C:\Users\Admin\Pictures\ApproveEnter.crw.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File renamed C:\Users\Admin\Pictures\StopOut.png => C:\Users\Admin\Pictures\StopOut.png.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File renamed C:\Users\Admin\Pictures\StopResolve.raw => C:\Users\Admin\Pictures\StopResolve.raw.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File renamed C:\Users\Admin\Pictures\WatchLock.tiff => C:\Users\Admin\Pictures\WatchLock.tiff.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\UndoDeny.tif.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\UpdateRegister.tiff 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\WatchLock.tiff 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe File opened for modification C:\Users\Admin\Pictures\WatchLock.tiff.o4h6Kyt6i 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe -
Sets desktop wallpaper using registry ⋅ 2 TTPs 2 IoCs
Processes:
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\o4h6Kyt6i.bmp" 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\o4h6Kyt6i.bmp" 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger ⋅ 6 IoCs
Processes:
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exepid process 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe -
Modifies Control Panel ⋅ 3 IoCs
Processes:
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\Desktop\WallpaperStyle = "10" 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe -
Opens file in notepad (likely ransom note) ⋅ 1 IoCs
Processes:
NOTEPAD.EXEpid process 2632 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses ⋅ 4 IoCs
Processes:
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exepid process 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe -
Suspicious use of AdjustPrivilegeToken ⋅ 17 IoCs
Processes:
2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exevssvc.exedescription pid process Token: SeBackupPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeDebugPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: 36 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeImpersonatePrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeIncBasePriorityPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeIncreaseQuotaPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: 33 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeManageVolumePrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeProfSingleProcessPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeRestorePrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeSecurityPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeSystemProfilePrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeTakeOwnershipPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeShutdownPrivilege 3448 2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe Token: SeBackupPrivilege 2912 vssvc.exe Token: SeRestorePrivilege 2912 vssvc.exe Token: SeAuditPrivilege 2912 vssvc.exe -
Suspicious use of FindShellTrayWindow ⋅ 1 IoCs
Processes:
NOTEPAD.EXEpid process 2632 NOTEPAD.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe"C:\Users\Admin\AppData\Local\Temp\2e50eb85f6e271001e69c5733af95c34728893145766066c5ff8708dcc0e43b2.exe"Modifies extensions of user filesSets desktop wallpaper using registrySuspicious use of NtSetInformationThreadHideFromDebuggerModifies Control PanelSuspicious behavior: EnumeratesProcessesSuspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exeSuspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\o4h6Kyt6i.README.txtOpens file in notepad (likely ransom note)Suspicious use of FindShellTrayWindow
Network
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Replay Monitor
Downloads
-
C:\Users\Admin\Desktop\o4h6Kyt6i.README.txtMD5
b7f54f12f8d46188c98172cf6c39f91e
SHA173f9572f52d54b2cffb8e4464f28453bc3d192b9
SHA256dedefcd61e8ed1e5a7c8a9469aad4605042ce2eb69c2b20cf6e1ed9b8a14f56d
SHA5122f0f138db798902990fb4c4cd4f05c66f656a7aef5aa186bad17a39683973c98da392b5207d9ba654a6e2774d920bbf2afea996513e91d159cb87961548374d5