Analysis
-
max time kernel
82s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-03-2023 04:43
Behavioral task
behavioral1
Sample
amostra.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
amostra.bin.exe
Resource
win10v2004-20230220-en
General
-
Target
amostra.bin.exe
-
Size
80KB
-
MD5
e3269531cf93d040b08074bfb31b72a0
-
SHA1
45b6d89dcea02cc90ae054d72ec80a2eb1036a7e
-
SHA256
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859
-
SHA512
e4de5613557ff15f23e2c28763fee6443c81351401974389e1c01cb979efc81c0ff397b85ba3fc6f0204f7c5e0c7617617130d38b441748446e72a0fbb7a12b0
-
SSDEEP
1536:NE+VYVYMC2F7Aoter2j1lYgpM2HT02F4mHI5PsOqy:2+G3eaj0g+2HT025Hs
Malware Config
Extracted
blackmatter
1.2
Extracted
C:\dlqtRkatW.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\GrantRestart.tiff => C:\Users\Admin\Pictures\GrantRestart.tiff.dlqtRkatW amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\GrantRestart.tiff.dlqtRkatW amostra.bin.exe File renamed C:\Users\Admin\Pictures\RegisterAssert.tif => C:\Users\Admin\Pictures\RegisterAssert.tif.dlqtRkatW amostra.bin.exe File renamed C:\Users\Admin\Pictures\DisableUpdate.tiff => C:\Users\Admin\Pictures\DisableUpdate.tiff.dlqtRkatW amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\DisableUpdate.tiff.dlqtRkatW amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\GrantRestart.tiff amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\RegisterAssert.tif.dlqtRkatW amostra.bin.exe File renamed C:\Users\Admin\Pictures\SetInitialize.tif => C:\Users\Admin\Pictures\SetInitialize.tif.dlqtRkatW amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\SetInitialize.tif.dlqtRkatW amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\DisableUpdate.tiff amostra.bin.exe File renamed C:\Users\Admin\Pictures\DismountConvert.tif => C:\Users\Admin\Pictures\DismountConvert.tif.dlqtRkatW amostra.bin.exe File opened for modification C:\Users\Admin\Pictures\DismountConvert.tif.dlqtRkatW amostra.bin.exe -
resource yara_rule behavioral2/memory/2232-133-0x00000000009D0000-0x00000000009E7000-memory.dmp upx behavioral2/memory/2232-374-0x00000000009D0000-0x00000000009E7000-memory.dmp upx -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\dlqtRkatW.bmp" amostra.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\dlqtRkatW.bmp" amostra.bin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2232 amostra.bin.exe 2232 amostra.bin.exe 2232 amostra.bin.exe 2232 amostra.bin.exe 2232 amostra.bin.exe 2232 amostra.bin.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International amostra.bin.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\Desktop amostra.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\Desktop\WallpaperStyle = "10" amostra.bin.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2232 amostra.bin.exe 2232 amostra.bin.exe 2232 amostra.bin.exe 2232 amostra.bin.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 2232 amostra.bin.exe Token: SeDebugPrivilege 2232 amostra.bin.exe Token: 36 2232 amostra.bin.exe Token: SeImpersonatePrivilege 2232 amostra.bin.exe Token: SeIncBasePriorityPrivilege 2232 amostra.bin.exe Token: SeIncreaseQuotaPrivilege 2232 amostra.bin.exe Token: 33 2232 amostra.bin.exe Token: SeManageVolumePrivilege 2232 amostra.bin.exe Token: SeProfSingleProcessPrivilege 2232 amostra.bin.exe Token: SeRestorePrivilege 2232 amostra.bin.exe Token: SeSecurityPrivilege 2232 amostra.bin.exe Token: SeSystemProfilePrivilege 2232 amostra.bin.exe Token: SeTakeOwnershipPrivilege 2232 amostra.bin.exe Token: SeShutdownPrivilege 2232 amostra.bin.exe Token: SeBackupPrivilege 4596 vssvc.exe Token: SeRestorePrivilege 4596 vssvc.exe Token: SeAuditPrivilege 4596 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\amostra.bin.exe"C:\Users\Admin\AppData\Local\Temp\amostra.bin.exe"1⤵
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4596
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f66968c47a64569e2281f65a95991be0
SHA1ef9e3e80bfbea4c3021b226cb8cd00687013b8a8
SHA2564b950c763006e7c4569df8742855cec31bf82f835bd7e2bdcb5f128db34c82bf
SHA512cb4ace1b3e891ab100b3950c6bc133b216e91c8978a3af1ffd75617b606bb7ceb0133f44d37a30a827655e5b84b016d736a732f5f37635bb727e1a5b722cad24