Analysis

  • max time kernel
    143s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2023 22:03

General

  • Target

    b07ff2183904731e4905b1bc1e23d24e.exe

  • Size

    31KB

  • MD5

    b07ff2183904731e4905b1bc1e23d24e

  • SHA1

    3fe14bbf67d25bfa3b9d06f5f1fc7812aa28a687

  • SHA256

    3a03530c732ebe53cdd7c17bee0988896d36c2b632dbd6118613697c2af82117

  • SHA512

    e7774b76759952979bac48a5f1a24808d957181d5720393f16cfb6af054253a47fd63c9f068203eb2433ff768979c59043f9f4a52cf734f375583ddaba478c4d

  • SSDEEP

    768:TOdT6nmM1SJbpRP4EBg6AXTOJvFQ9z8CYI3j3i4O7D:Cdmnvgd4EeszQxXYIm

Score
10/10

Malware Config

Extracted

Path

C:\jvdo5eVo9.README.txt

Family

blackmatter

Ransom Note
~+ * + ' BLACK | () .-.,='``'=. - o - '=/_ \ | * | '=._ | \ `=./`, ' . '=.__.=' `=' * + Matter + O * ' . >>> What happens? Your network is encrypted, and currently not operational. We need only money, after payment we will give you a decryptor for the entire network and you will restore all the data. >>> What guarantees? We are not a politically motivated group and we do not need anything other than your money. If you pay, we will provide you the programs for decryption and we will delete your data. If we do not give you decrypters or we do not delete your data, no one will pay us in the future, this does not comply with our goals. We always keep our promises. >>> How to contact with us? 1. Download and install TOR Browser (https://www.torproject.org/). 2. Open http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/GDBJS76DH3D4IKQD2QO7R. >>> Warning! Recovery recommendations. We strongly recommend you to do not MODIFY or REPAIR your files, that will damage them.
URLs

http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/GDBJS76DH3D4IKQD2QO7R

Extracted

Family

blackmatter

Version

1.2

Signatures

  • BlackMatter Ransomware

    BlackMatter ransomware group claims to be Darkside and REvil succesor.

  • Renames multiple (135) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Modifies Control Panel 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b07ff2183904731e4905b1bc1e23d24e.exe
    "C:\Users\Admin\AppData\Local\Temp\b07ff2183904731e4905b1bc1e23d24e.exe"
    1⤵
    • Sets desktop wallpaper using registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies Control Panel
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4692
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\jvdo5eVo9.README.txt

    Filesize

    1KB

    MD5

    8a485e9f1237d69236522d2409a7fc3c

    SHA1

    fab1b7c56399623ae49ba840d0a88deb20099b5d

    SHA256

    d9006d5c753c364b27388831f03332f404b719a66f344ce8b1a340da24e93d53

    SHA512

    d0f2416496c77ad305de712ac8b6b42d9b57337eec88e66dddd8fc59309acda7a08ab3a492b961a850e8e501eafc0b23f6371af78210b86beefaae980e014483

  • memory/4692-0-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4692-1-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-2-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-206-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/4692-208-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-209-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB