Resubmissions

25-09-2023 22:55

230925-2wd9xadh33 10

25-09-2023 22:53

230925-2t7hnscf3w 10

25-09-2023 13:16

230925-qh75aafa7s 10

25-09-2023 13:05

230925-qbt9vagc74 10

25-09-2023 13:00

230925-p8r1bafa2y 10

Analysis

  • max time kernel
    97s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2023 22:53

General

  • Target

    blackcat.exe

  • Size

    2.6MB

  • MD5

    bb266486ee8ac70c0687989e02cefa14

  • SHA1

    11203786b17bb3873d46acae32a898c8dac09850

  • SHA256

    0c6f444c6940a3688ffc6f8b9d5774c032e3551ebbccb64e4280ae7fc1fac479

  • SHA512

    a167779fc95a5cf0a3eff86211e9e08c282470e050b17ae62c7499a82ea59b3447446eafea9d7b5c5ba833b7a2d060f76530b00509dd5ff7904a0735d83e14c4

  • SSDEEP

    49152:rEqvaaAjc2hdKjb8WXqE1PiEbE/TKMt3/RgaJ2wW4PRT8O1:rbyaALKjwWXV1P9oVvwwW4JT8

Score
10/10

Malware Config

Extracted

Family

blackcat

Credentials
  • Username:
    KELLERSUPPLY\Administrator
  • Password:
    d@gw00d
  • Username:
    KELLERSUPPLY\AdminRecovery
  • Password:
    K3ller!$Supp1y
  • Username:
    .\Administrator
  • Password:
    d@gw00d
  • Username:
    .\Administrator
  • Password:
    K3ller!$Supp1y
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    false

  • enable_set_wallpaper

    true

  • extension

    sykffle

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://zujgzbu5y64xbmvc42addp4lxkoosb4tslf5mehnh7pvqjpwxn5gokyd.onion/b21e1fb6-ff88-425b-8339-3523179a1e3e/886cf430a907bbe9a3fd38fb704d524dbd199c1b042ad6f65dc72ad78704e21 >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://mu75ltv3lxd24dbyu6gtvmnwybecigs5auki7fces437xvvflzva2nqd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

  • BlackCat

    A Rust-based ransomware sold as RaaS first seen in late 2021.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 26 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\blackcat.exe
    "C:\Users\Admin\AppData\Local\Temp\blackcat.exe"
    1⤵
      PID:420
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Desktop\HideEnable.gif
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1356 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2672
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\~DF92AF20C39E56B746.TMP

      Filesize

      16KB

      MD5

      df0a9d0f5dbbf4e12cb3c5058532aba5

      SHA1

      3f85810f590b05311abdc67ddf966b89da84ac7a

      SHA256

      466711acb0bdf66ceda99e4b520b6632bb9b7ccea0d6e34eb9be434e7b1125c5

      SHA512

      bcde4cf98dc6542f0a59bbddb176d2b9163116f37c5af8a3b1fe72567d32c1b02e654708d922e44f2f385c93dc160d8b22d8521f360adb2be4f05959caf7e348

    • memory/420-0-0x0000000000400000-0x00000000006C7000-memory.dmp

      Filesize

      2.8MB

    • memory/420-1-0x0000000000400000-0x00000000006C7000-memory.dmp

      Filesize

      2.8MB

    • memory/4540-23-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-18-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-19-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-17-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-24-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-25-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-27-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-29-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-28-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB

    • memory/4540-26-0x0000020334CF0000-0x0000020334CF1000-memory.dmp

      Filesize

      4KB