Resubmissions

05-07-2024 09:16

240705-k8zypswarl 10

04-07-2023 12:54

230704-p5jjrsdb35 10

Analysis

  • max time kernel
    65s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    05-07-2024 09:16

General

  • Target

    731adcf2d7fb61a8335e23dbe.exe

  • Size

    2.9MB

  • MD5

    173c4085c23080d9fb19280cc507d28d

  • SHA1

    a186c08d3d10885ebb129b1a0d8ea0da056fc362

  • SHA256

    731adcf2d7fb61a8335e23dbee2436249e5d5753977ec465754c6b699e9bf161

  • SHA512

    626c4dbc60988566446e2e59840953cb53ec9ad64914ab2758519941f60aa27db9ff574a188cf32039690f1f34a6834f8c3804f2aa1f89b409d9a98c07ea8267

  • SSDEEP

    49152:rAnCsMZjVpVbl4D5GzNMFsl4UROAUc1y32ZxJFi4N1/RgaJ2w1M:rAnCs8pVblGyNM+l4UxUc1BhFDvww1M

Score
10/10

Malware Config

Extracted

Family

blackcat

Credentials
  • Username:
    CREDITONE\Administrator
  • Password:
    K3ny@2009
  • Username:
    CREDITONE\bexec
  • Password:
    CloneD1sk4Song$%
  • Username:
    CREDITONE\KLarry
  • Password:
    Kl..2021
  • Username:
    CREDITONE\BKuhl
  • Password:
    Gromit2021!
  • Username:
    CREDITONE\rlopez
  • Password:
    Victoria7856!
  • Username:
    CREDITONE\EJaramilla
  • Password:
    1LoveVeros4
  • Username:
    .\Administrator
  • Password:
    $fiji12$
Attributes
  • enable_network_discovery

    true

  • enable_self_propagation

    true

  • enable_set_wallpaper

    true

  • extension

    7954i9r

  • note_file_name

    RECOVER-${EXTENSION}-FILES.txt

  • note_full_text

    >> Introduction Important files on your system was ENCRYPTED and now they have have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your system was DOWNLOADED and it will be PUBLISHED if you refuse to cooperate. Data includes: - Employees personal data, CVs, DL, SSN. - Complete network map including credentials for local and remote services. - Financial information including clients data, bills, budgets, annual reports, bank statements. - Complete datagrams/schemas/drawings for manufacturing in solidworks format - And more... Private preview is published here: http://alphvmmm27o3abo3r2mlmjrpdmzle3rykajqc5xsj7j7ejksbpsa36ad.onion/336eb50d-ebf8-436b-937d-ec075de46e7f/419ef3f950d9f346cf86db56db453539dcd51567ea871728e78dbc9918c7efeb >> CAUTION DO NOT MODIFY FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. YOUR DATA IS STRONGLY ENCRYPTED, YOU CAN NOT DECRYPT IT WITHOUT CIPHER KEY. >> Recovery procedure Follow these simple steps to get in touch and recover your data: 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://sty5r4hhb5oihbq2mwevrofdiqbgesi66rvxr5sr573xgvtuvr4cs5yd.onion/?access-key=${ACCESS_KEY}

rsa_pubkey.plain

Signatures

  • BlackCat

    A Rust-based ransomware sold as RaaS first seen in late 2021.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\731adcf2d7fb61a8335e23dbe.exe
    "C:\Users\Admin\AppData\Local\Temp\731adcf2d7fb61a8335e23dbe.exe"
    1⤵
      PID:1740
    • C:\Windows\System32\xpsrchvw.exe
      "C:\Windows\System32\xpsrchvw.exe" "C:\Users\Admin\Desktop\UnprotectOut.xps"
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:2800
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\AssertConnect.mpg"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      PID:2644
    • C:\Program Files\VideoLAN\VLC\vlc.exe
      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\AssertConnect.mpg"
      1⤵
        PID:1912

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1740-0-0x0000000000400000-0x00000000006F3000-memory.dmp

        Filesize

        2.9MB

      • memory/1912-7-0x000007FEF74C0000-0x000007FEF74D1000-memory.dmp

        Filesize

        68KB

      • memory/1912-3-0x000007FEF6880000-0x000007FEF68B4000-memory.dmp

        Filesize

        208KB

      • memory/1912-2-0x000000013F6C0000-0x000000013F7B8000-memory.dmp

        Filesize

        992KB

      • memory/1912-5-0x000007FEF8120000-0x000007FEF8138000-memory.dmp

        Filesize

        96KB

      • memory/1912-6-0x000007FEF7EB0000-0x000007FEF7EC7000-memory.dmp

        Filesize

        92KB

      • memory/1912-4-0x000007FEF65C0000-0x000007FEF6876000-memory.dmp

        Filesize

        2.7MB

      • memory/2644-32-0x000007FEF5050000-0x000007FEF5061000-memory.dmp

        Filesize

        68KB

      • memory/2644-28-0x000007FEF50D0000-0x000007FEF50F1000-memory.dmp

        Filesize

        132KB

      • memory/2644-17-0x000007FEF65C0000-0x000007FEF6876000-memory.dmp

        Filesize

        2.7MB

      • memory/2644-22-0x000007FEF6450000-0x000007FEF6461000-memory.dmp

        Filesize

        68KB

      • memory/2644-21-0x000007FEF6470000-0x000007FEF6487000-memory.dmp

        Filesize

        92KB

      • memory/2644-20-0x000007FEF74C0000-0x000007FEF74D1000-memory.dmp

        Filesize

        68KB

      • memory/2644-19-0x000007FEF7EB0000-0x000007FEF7EC7000-memory.dmp

        Filesize

        92KB

      • memory/2644-18-0x000007FEF8120000-0x000007FEF8138000-memory.dmp

        Filesize

        96KB

      • memory/2644-16-0x000007FEF6880000-0x000007FEF68B4000-memory.dmp

        Filesize

        208KB

      • memory/2644-23-0x000007FEF6430000-0x000007FEF644D000-memory.dmp

        Filesize

        116KB

      • memory/2644-24-0x000007FEF6410000-0x000007FEF6421000-memory.dmp

        Filesize

        68KB

      • memory/2644-29-0x000007FEF50B0000-0x000007FEF50C8000-memory.dmp

        Filesize

        96KB

      • memory/2644-30-0x000007FEF5090000-0x000007FEF50A1000-memory.dmp

        Filesize

        68KB

      • memory/2644-25-0x000007FEF5360000-0x000007FEF6410000-memory.dmp

        Filesize

        16.7MB

      • memory/2644-34-0x000007FEF5010000-0x000007FEF5021000-memory.dmp

        Filesize

        68KB

      • memory/2644-26-0x000007FEF5150000-0x000007FEF535B000-memory.dmp

        Filesize

        2.0MB

      • memory/2644-27-0x000007FEF5100000-0x000007FEF5141000-memory.dmp

        Filesize

        260KB

      • memory/2644-15-0x000000013F6C0000-0x000000013F7B8000-memory.dmp

        Filesize

        992KB

      • memory/2644-31-0x000007FEF5070000-0x000007FEF5081000-memory.dmp

        Filesize

        68KB

      • memory/2644-33-0x000007FEF5030000-0x000007FEF504B000-memory.dmp

        Filesize

        108KB

      • memory/2644-42-0x000007FEF4DF0000-0x000007FEF4E14000-memory.dmp

        Filesize

        144KB

      • memory/2644-48-0x000007FEF4010000-0x000007FEF4021000-memory.dmp

        Filesize

        68KB

      • memory/2644-47-0x000007FEF4120000-0x000007FEF4131000-memory.dmp

        Filesize

        68KB

      • memory/2644-46-0x000007FEF4D60000-0x000007FEF4D72000-memory.dmp

        Filesize

        72KB

      • memory/2644-45-0x000007FEF4D80000-0x000007FEF4D91000-memory.dmp

        Filesize

        68KB

      • memory/2644-44-0x000007FEF4DA0000-0x000007FEF4DC3000-memory.dmp

        Filesize

        140KB

      • memory/2644-43-0x000007FEF4DD0000-0x000007FEF4DE8000-memory.dmp

        Filesize

        96KB

      • memory/2644-41-0x000007FEF4E20000-0x000007FEF4E48000-memory.dmp

        Filesize

        160KB

      • memory/2644-40-0x000007FEF4E50000-0x000007FEF4EA7000-memory.dmp

        Filesize

        348KB

      • memory/2644-39-0x000007FEF4EB0000-0x000007FEF4EC1000-memory.dmp

        Filesize

        68KB

      • memory/2644-38-0x000007FEF4ED0000-0x000007FEF4F4C000-memory.dmp

        Filesize

        496KB

      • memory/2644-37-0x000007FEF4F50000-0x000007FEF4FB7000-memory.dmp

        Filesize

        412KB

      • memory/2644-36-0x000007FEF4FC0000-0x000007FEF4FF0000-memory.dmp

        Filesize

        192KB

      • memory/2644-35-0x000007FEF4FF0000-0x000007FEF5008000-memory.dmp

        Filesize

        96KB

      • memory/2800-1-0x0000000002780000-0x0000000002781000-memory.dmp

        Filesize

        4KB