Overview
overview
10Static
static
1034c392448f...ea.exe
windows7-x64
1034c392448f...ea.exe
windows7-x64
1034c392448f...ea.exe
windows10-2004-x64
1034c392448f...ea.exe
windows10-ltsc_2021-x64
1034c392448f...ea.exe
windows11-21h2-x64
1037d8add251...4c.exe
windows10-2004-x64
837d8add251...4c.exe
windows7-x64
1037d8add251...4c.exe
windows10-2004-x64
837d8add251...4c.exe
windows10-ltsc_2021-x64
837d8add251...4c.exe
windows11-21h2-x64
83a72653053...59.exe
windows11-21h2-x64
103a72653053...59.exe
windows7-x64
103a72653053...59.exe
windows10-2004-x64
103a72653053...59.exe
windows10-ltsc_2021-x64
103a72653053...59.exe
windows11-21h2-x64
1049aca08f5b...24.exe
windows11-21h2-x64
1049aca08f5b...24.exe
windows7-x64
1049aca08f5b...24.exe
windows10-2004-x64
1049aca08f5b...24.exe
windows10-ltsc_2021-x64
1049aca08f5b...24.exe
windows11-21h2-x64
104a2ad49c93...9f.exe
windows10-2004-x64
34a2ad49c93...9f.exe
windows7-x64
34a2ad49c93...9f.exe
windows10-2004-x64
34a2ad49c93...9f.exe
windows10-ltsc_2021-x64
34a2ad49c93...9f.exe
windows11-21h2-x64
35199b64b50...3c.exe
windows7-x64
5199b64b50...3c.exe
windows7-x64
5199b64b50...3c.exe
windows10-2004-x64
5199b64b50...3c.exe
windows10-ltsc_2021-x64
5199b64b50...3c.exe
windows11-21h2-x64
1Resubmissions
25/03/2025, 13:12
250325-qfl42aznw9 1025/03/2025, 13:09
250325-qdtq4aznv6 1025/03/2025, 13:05
250325-qbtcjszns3 1025/03/2025, 13:01
250325-p9k86awxat 1025/03/2025, 12:55
250325-p58tnawwe1 1025/03/2025, 12:51
250325-p3txqazmt6 1005/02/2025, 11:16
250205-ndjvsavrdm 1016/07/2024, 08:54
240716-kt64gavakp 10Analysis
-
max time kernel
104s -
max time network
107s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
25/03/2025, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral4
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral5
Sample
34c392448fc0818278cd19bb0841adf573e967be8a0f73bb42bb367a5835b6ea.exe
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral10
Sample
37d8add251cb4179224ebbc0e28f8d9e26b5e64bbaec37f26a996bf51556f04c.exe
Resource
win11-20250314-en
Behavioral task
behavioral11
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win7-20250207-en
Behavioral task
behavioral13
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral15
Sample
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral20
Sample
49aca08f5b259860364fc224601a944aa17161bb1da688e24621038457472d24.exe
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral22
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral25
Sample
4a2ad49c934f9ae6ca6b5d0c7cc34f5e12d349640012fa8cf8eb7e2d3acd6c9f.exe
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win7-20241010-en
Behavioral task
behavioral27
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral30
Sample
5199b64b50f678d75f85cb0c3ac97d7df67f23471815e21236b1a790d008fe3c.exe
Resource
win11-20250313-en
General
-
Target
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe
-
Size
80KB
-
MD5
e3269531cf93d040b08074bfb31b72a0
-
SHA1
45b6d89dcea02cc90ae054d72ec80a2eb1036a7e
-
SHA256
3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859
-
SHA512
e4de5613557ff15f23e2c28763fee6443c81351401974389e1c01cb979efc81c0ff397b85ba3fc6f0204f7c5e0c7617617130d38b441748446e72a0fbb7a12b0
-
SSDEEP
1536:NE+VYVYMC2F7Aoter2j1lYgpM2HT02F4mHI5PsOqy:2+G3eaj0g+2HT025Hs
Malware Config
Extracted
C:\QkiINTXIT.README.txt
blackmatter
http://supp24yy6a66hwszu2piygicgwzdtbwftb76htfj7vnip3getgqnzxid.onion/7NT6LXKC1XQHW5039BLOV
Extracted
blackmatter
1.2
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Blackmatter family
-
Renames multiple (145) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\QkiINTXIT.bmp" 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Set value (str) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\QkiINTXIT.bmp" 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
resource yara_rule behavioral14/memory/3216-0-0x0000000000A50000-0x0000000000A67000-memory.dmp upx behavioral14/memory/3216-199-0x0000000000A50000-0x0000000000A67000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Modifies Control Panel 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\Desktop 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Set value (str) \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\Desktop\WallpaperStyle = "10" 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Key created \REGISTRY\USER\S-1-5-21-780313508-644878201-565826771-1000\Control Panel\International 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeDebugPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: 36 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeImpersonatePrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeIncBasePriorityPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeIncreaseQuotaPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: 33 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeManageVolumePrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeProfSingleProcessPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeRestorePrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeSecurityPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeSystemProfilePrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeTakeOwnershipPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeShutdownPrivilege 3216 3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe Token: SeBackupPrivilege 1480 vssvc.exe Token: SeRestorePrivilege 1480 vssvc.exe Token: SeAuditPrivilege 1480 vssvc.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exeC:\Users\Admin\AppData\Local\Temp\3a7265305386f955adbeb6bd7c711f03395963ac36be82e5bb6b1d7b2034c859.exe bcdedit /set shutdown /r /f /t 21⤵
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f66968c47a64569e2281f65a95991be0
SHA1ef9e3e80bfbea4c3021b226cb8cd00687013b8a8
SHA2564b950c763006e7c4569df8742855cec31bf82f835bd7e2bdcb5f128db34c82bf
SHA512cb4ace1b3e891ab100b3950c6bc133b216e91c8978a3af1ffd75617b606bb7ceb0133f44d37a30a827655e5b84b016d736a732f5f37635bb727e1a5b722cad24