Analysis
-
max time kernel
5s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 13:28
Behavioral task
behavioral1
Sample
38035325b785329e3f618b2a0b90eb75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
38035325b785329e3f618b2a0b90eb75.exe
Resource
win10v2004-20231215-en
General
-
Target
38035325b785329e3f618b2a0b90eb75.exe
-
Size
78KB
-
MD5
38035325b785329e3f618b2a0b90eb75
-
SHA1
33294a6c609b6ced2acef3964d7ec34dc0101a9a
-
SHA256
5da8d2e1b36be0d661d276ea6523760dbe3fa4f3fdb7e32b144812ce50c483fa
-
SHA512
675a0defdfa3de5f54ece0297d955372480f25e8b9f27fa700d5cdc2c6ecedadc7b68cac2f8e2e452bdbab6a958593f45d3eab14d6e7bbfee472383879bd7b17
-
SSDEEP
1536:WnICS4ArFnRoHhcVyid9EZZoi+zQQaHYqf5O4QN:BZnmqVyq9EN+MvlZQ
Malware Config
Extracted
C:\PS3b2NjbL.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/O3KTUJZRE6CB4Q1OBR
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1704 38035325b785329e3f618b2a0b90eb75.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Control Panel\International 38035325b785329e3f618b2a0b90eb75.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 1772 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 38035325b785329e3f618b2a0b90eb75.exe 1704 38035325b785329e3f618b2a0b90eb75.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeDebugPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: 36 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeImpersonatePrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeIncBasePriorityPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeIncreaseQuotaPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: 33 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeManageVolumePrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeProfSingleProcessPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeRestorePrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeSecurityPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeSystemProfilePrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeTakeOwnershipPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeShutdownPrivilege 1704 38035325b785329e3f618b2a0b90eb75.exe Token: SeBackupPrivilege 2296 vssvc.exe Token: SeRestorePrivilege 2296 vssvc.exe Token: SeAuditPrivilege 2296 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\38035325b785329e3f618b2a0b90eb75.exe"C:\Users\Admin\AppData\Local\Temp\38035325b785329e3f618b2a0b90eb75.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1704 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" /p C:\PS3b2NjbL.README.txt2⤵
- Opens file in notepad (likely ransom note)
PID:1772 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122883⤵PID:1948
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2296
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52a2ac841d6b7515f4b1021b92cc5f072
SHA1e48a7a2be20b978f71a92f12ada328bcfd0b89c6
SHA2569a59566d9ef3bab7faf9abc23f25aa19218d5afa2a910144acd011a78521377e
SHA512a7944a10f2721db3dbdf5c36e80aae057c5fc8e2aab22a8d50c4d4e6436a7e22313257dd934961db1fa5e506c39ca23600c9d3e96a463221c13b54651bd47579
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57798f53af1534c9d32716a9b35f43847
SHA1f9bae192227a71018458274681c4d1c48ee71f51
SHA25623ff7a417ee817b8cb39f471157a8bdee2fc0f436a0bcaee5def891961b6c845
SHA512f36371b717649bfc44b77389419b8247548cce9cecc25ec485885038223983846aba8b90cf5cf3075eb649dcc20e6fa0e0eb30c68ce3fae54ed350b5467f83b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5245b5442cff8d047d9534ead5a2a4df6
SHA101195948951c00aaaee819ec39bbb7b901a3cde3
SHA2568ac34c61ed5df8780474957508d883bf0118885a1839307f278e65116350c138
SHA512ffb542043c3e56d8c7d8eee74a43f60e9756a4a330ffb3187d5716e449d40615046f75d8b0d8c2039effada1b0380a755ad5077bc0f033db66018eb62d1e9738
-
Filesize
26KB
MD53abcd21a1c7911b3991c847cfc29a2f4
SHA119a9bcbeb756ecb2618cfa4ee0ffa13673c2385d
SHA2567f225d7cb23569378ea625ab026062087100de3f487883fed9d1e26b23ea1f81
SHA5125984f47bdd48d8f1d22a28d8725109480db51592d5b9e2206033d83ad52b9c936117db52c19408004e53f4c6a96b5a6d4f293981b6bd36f6587d609007d6dfd8
-
Filesize
63KB
MD5dd700e53705dc1dffd7fb3b926d1155a
SHA1a799f95de1d17de6faf920906e780e0c58cb6ef1
SHA256d712201a4ed651010eaeda39737393a4270af115aa0e5c084b7fc952886daf07
SHA5128a220a5165d0ef79d37ca2ca76a7d4cf3edf71ed96c3d4e9acb33a9c19f9183c6d61ee45283b771c30170f70e4be9585baee281c83ae9e2b154dbaefc6dd2e6c