Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 01:27
Behavioral task
behavioral1
Sample
6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896.exe
Resource
win10v2004-20241007-en
General
-
Target
6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896.exe
-
Size
2.9MB
-
MD5
cf2264987cc01dc8d3f72027347a968b
-
SHA1
3d385b316df5d37d39b10113a67080fc1516e0c9
-
SHA256
6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896
-
SHA512
3a8ce5a82f4455804e8f0a43526b8d60524426a4a4ae04f777cfd6d139ef6e7adcc4cbc07fcbe6399f6ad583e293fa6f6b27e95db30f14a89cf51ca5622516e6
-
SSDEEP
49152:H0z5TqmuGSSJLiqwRrYqFrjsAkJxyNuN/RgaJ2wp4:OVh/xGDCbJPvwwp4
Malware Config
Extracted
blackcat
- Username:
Administrateur - Password:
Imed
- Username:
Irvoas - Password:
irvoas
- Username:
secretariat - Password:
secretariat
- Username:
cao - Password:
cao
-
enable_network_discovery
true
-
enable_self_propagation
true
-
enable_set_wallpaper
true
-
extension
ua3a2q0
-
note_file_name
RECOVER-${EXTENSION}-FILES.txt
-
note_full_text
Meow Meow. Bonjour. Welcome to the Black Cat Ransomware. We have been infilitrating your network for weeks and uploading all your files to our servers. We have ALL your info, ongoing projects (affaires en cours) and ended ones, providers information, passports... You better contact us fast, price will be cheaper and no one will know. If you dont contact in 5 days, we will contact all your customers 1 by 1 and publishing their info. Dont waste time with backups, we have deleted them. >> What happened? Important files on your network was ENCRYPTED and now they have "${EXTENSION}" extension. In order to recover your files you need to follow instructions below. >> Sensitive Data Sensitive data on your network was DOWNLOADED. If you DON'T WANT your sensitive data to be PUBLISHED you have to act quickly. Data includes: -Affaires en course -Affaires termines -Fournisseurs -Logiciels -Disputes -Blueprints for all your projects. -Customers contact and financial information. - Employees personal data, includin passports -All the emails (/sauve mail). - Complete network map including credentials for local and remote services. - Private financial information including: clients data, bills, budgets, annual reports, bank statements. - Manufacturing documents including: datagrams, schemas, drawings in solidworks format - And more... >> CAUTION DO NOT MODIFY ENCRYPTED FILES YOURSELF. DO NOT USE THIRD PARTY SOFTWARE TO RESTORE YOUR DATA. YOU MAY DAMAGE YOUR FILES, IT WILL RESULT IN PERMANENT DATA LOSS. >> What should I do next? 1) Download and install Tor Browser from: https://torproject.org/ 2) Navigate to: http://lputkyq4cnbwrpdmjfahc6vnvs2rhia6fq2eycjuxvv5dbob3mqvh6qd.onion/?access-key=${ACCESS_KEY}
Signatures
-
BlackCat
A Rust-based ransomware sold as RaaS first seen in late 2021.
-
Blackcat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3672 taskmgr.exe Token: SeSystemProfilePrivilege 3672 taskmgr.exe Token: SeCreateGlobalPrivilege 3672 taskmgr.exe Token: 33 3672 taskmgr.exe Token: SeIncBasePriorityPrivilege 3672 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe 3672 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896.exe"C:\Users\Admin\AppData\Local\Temp\6660d0e87a142ab1bde4521d9c6f5e148490b05a57c71122e28280b35452e896.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3772
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3672